MAL-2026-1554

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/typescript-validation-schema/MAL-2026-1554.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-1554
Aliases
  • GHSA-7fgc-cc3q-qj25
Published
2026-03-16T00:00:00Z
Modified
2026-04-28T05:08:03.837578Z
Summary
Malicious code in typescript-validation-schema (npm)
Details

The package 'typescript-validation-schema' is part of the PhantomRaven supply chain attack campaign (Wave 2). It uses a Remote Dynamic Dependency (RDD) technique: the published package appears benign but includes a URL-based dependency in package.json pointing to an attacker-controlled C2 server (npm.jpartifacts.com). During npm install, npm automatically fetches a malicious tarball from the C2. The tarball preinstall hook executes a 259-line payload that harvests developer emails from .gitconfig, .npmrc, and environment variables; collects CI/CD tokens from GitHub Actions, GitLab CI, Jenkins, and CircleCI; fingerprints the host system; and exfiltrates all data to http://npm.jpartifacts.com/jpd.php via redundant HTTP GET, POST, and WebSocket channels with no visible terminal output. The campaign was first disclosed by Koi Security in October 2025 (Wave 1) and extended across Waves 2-4 between November 2025 and February 2026. Full analysis: https://www.endorlabs.com/learn/return-of-phantomraven

Any developer or CI/CD system that installed this package should be considered compromised. All secrets, tokens, and credentials accessible from that environment should be rotated immediately from a separate, unaffected machine.


-= Per source details. Do not edit below this line.=-

Source: amazon-inspector (6b4c685cb5fdfa0e53a7fcb2111ec2a77ece9fa648330aeec32118dca57b324b)

The package typescript-validation-schema was found to contain malicious code.

Source: ghsa-malware (3ba9dce0a2f2f5ad6428ab4c9a1851599050c44428ec2a4ad791afc80aa5a59a)

Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.

Database specific
{
    "iocs": {
        "domains": [
            "npm.jpartifacts.com"
        ],
        "urls": [
            "http://npm.jpartifacts.com/jpd.php"
        ]
    },
    "malicious-packages-origins": [
        {
            "id": "GHSA-7fgc-cc3q-qj25",
            "sha256": "3ba9dce0a2f2f5ad6428ab4c9a1851599050c44428ec2a4ad791afc80aa5a59a",
            "modified_time": "2026-03-18T06:57:45Z",
            "ranges": [
                {
                    "type": "SEMVER",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2026-03-18T07:37:38.743420191Z",
            "source": "ghsa-malware"
        },
        {
            "ranges": [
                {
                    "type": "SEMVER",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "6b4c685cb5fdfa0e53a7fcb2111ec2a77ece9fa648330aeec32118dca57b324b",
            "modified_time": "2026-03-23T05:11:41Z",
            "import_time": "2026-03-23T05:14:22.738953549Z",
            "source": "amazon-inspector"
        }
    ]
}
References
Credits

Affected packages

npm / typescript-validation-schema

Package

Name
typescript-validation-schema
View open source insights on deps.dev
Purl
pkg:npm/typescript-validation-schema

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Type
SEMVER
Events
Introduced
0.18.1

Affected versions

0.*
0.18.1

Database specific

cwes
[
    {
        "description": "The product contains code that appears to be malicious in nature.",
        "cweId": "CWE-506",
        "name": "Embedded Malicious Code"
    },
    {
        "description": "Embedded Malicious Code",
        "cweId": "CWE-506",
        "name": "Embedded Malicious Code"
    }
]
source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/typescript-validation-schema/MAL-2026-1554.json"