strapi-plugin-server is a malicious npm package disguised as a Strapi CMS plugin. On install, it runs a postinstall script that executes an 11-phase attack: stealing .env files, environment variables, Strapi configuration, private keys, Redis data, Docker/Kubernetes secrets, and network topology. It then opens a polling C2 loop that accepts and executes arbitrary shell commands from a remote server.
-= Per source details. Do not edit below this line.=-
The package strapi-plugin-server was found to contain malicious code.
{
"malicious-packages-origins": [
{
"import_time": "2026-04-07T14:39:19.031719752Z",
"modified_time": "2026-04-07T14:24:50Z",
"sha256": "f689c25ace6203687560dc542be39490569ca1a4ac27c2f83fda73cbe5dcbf60",
"source": "amazon-inspector",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
]
}
]
}