• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Information

Attack on node.js: No danger for NoSpamProxy customers

09.09.2025|Last edited:09.09.2025

On Monday, September 8, 2025, a significant attack on the software package supply chain for the widely used JavaScript runtime environment node.js was discovered. There is no danger for NoSpamProxy customers.

The attackers used spear phishing to gain access to a developer’s npm account and used the package manager to inject obfuscated malicious code into numerous popular packages. Based on current information, this appears to be the largest successful attack on npm to date.

About 20 of these are packages from the developer qix, which are downloaded more than two billion times a week. This has an impact on large parts of the Node.js universe. Furthermore, there are indications that packages from other developers may also have been contaminated with malware.

The malware discovered and investigated so far manipulates certain browser routines to intercept and manipulate data in the victim’s web browser. This affects both classic network traffic and traffic to and from programming interfaces (API). In addition, routines in any installed browser extensions for cryptocurrency wallets are modified.

The attackers’ goal is apparently to steal units of various cryptocurrencies. The malware waits for strings that look like wallet addresses and replaces the legitimate addresses with other addresses that are presumably controlled by the attacker.

Although we use npm in the development of NoSpamProxy, we do not use the compromised packages. There is therefore no danger for NoSpamProxy customers.

  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events

NoSpamProxy Newsletter

Subscribe to Newsletter
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • NIS2 Network and Information Systems Directive Preview
    NIS2 – What the directive means for you (Update 2026)29.01.2026 - 10:38
  • Wie Cloaking Phishing-Angriffe tarnt 800x800
    How cloaking disguises phishing attacks23.01.2026 - 09:45
  • Gelöschter SPF-Eintrag: Warum DNS-Alarmierung unverzichtbar ist 800x800
    When the service provider deletes the SPF record: Why DNS alerts are essential16.01.2026 - 10:00
IMPRINT • EULA • Privacy Policy • • © 2026 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: VS-NfD and email security: What IT administrators need to know Link to: VS-NfD and email security: What IT administrators need to know VS-NfD and email security: What IT administrators need to knowVS-NfD Verschlusssache nur für den Dienstgebrauch 1200x627 Link to: Phishing with fake automobile brochures Link to: Phishing with fake automobile brochures Phishing mit gefaelschten Autokatalogen 800x800Phishing with fake automobile brochures
Scroll to top Scroll to top Scroll to top