The package 'typescript-nhost' is part of the PhantomRaven supply chain attack campaign (Wave 2). It uses a Remote Dynamic Dependency (RDD) technique: the published package appears benign but includes a URL-based dependency in package.json pointing to an attacker-controlled C2 server (npm.jpartifacts.com). During npm install, npm automatically fetches a malicious tarball from the C2. The tarball preinstall hook executes a 259-line payload that harvests developer emails from .gitconfig, .npmrc, and environment variables; collects CI/CD tokens from GitHub Actions, GitLab CI, Jenkins, and CircleCI; fingerprints the host system; and exfiltrates all data to http://npm.jpartifacts.com/jpd.php via redundant HTTP GET, POST, and WebSocket channels with no visible terminal output. The campaign was first disclosed by Koi Security in October 2025 (Wave 1) and extended across Waves 2-4 between November 2025 and February 2026. Full analysis: https://www.endorlabs.com/learn/return-of-phantomraven
Any developer or CI/CD system that installed this package should be considered compromised. All secrets, tokens, and credentials accessible from that environment should be rotated immediately from a separate, unaffected machine.
-= Per source details. Do not edit below this line.=-
The package typescript-nhost was found to contain malicious code.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{
"malicious-packages-origins": [
{
"source": "ghsa-malware",
"modified_time": "2026-03-18T06:58:20Z",
"id": "GHSA-mm3f-jjww-x883",
"import_time": "2026-03-18T07:37:38.752501537Z",
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "000e6a2a15da3adbe95e2b5f6b17f69d139eb6a35c93ff7146cf7fd00ea476e3"
},
{
"source": "amazon-inspector",
"modified_time": "2026-03-23T05:11:41Z",
"import_time": "2026-03-23T05:14:22.467850447Z",
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"sha256": "bc728602c9a9fef494c0c4147fe7e2070f1acaad6cb0c28cb4278c2cfe82b331"
}
],
"iocs": {
"domains": [
"npm.jpartifacts.com"
],
"urls": [
"http://npm.jpartifacts.com/jpd.php"
]
}
}"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/typescript-nhost/MAL-2026-1552.json"
[
{
"description": "The product contains code that appears to be malicious in nature.",
"name": "Embedded Malicious Code",
"cweId": "CWE-506"
},
{
"description": "Embedded Malicious Code",
"name": "Embedded Malicious Code",
"cweId": "CWE-506"
}
]