MCP Security Alert: MarkItDown, Archon OS, Kubectl MCP

node-ipc npm Package Breached, Spreading Infostealer Malware

Breaking news: The node-ipc npm package — 3M+ monthly downloads — has been compromised to steal AI sessions, cloud credentials, and browser data. If you’ve installed version 12.0.1 in the last few hours, treat your machine as compromised.

Affected Packages

Package nameAffected versionsFix Version
node-ipc9.1.6, 9.2.3, 12.0.1Downgrade to 12.0.0

Overview

node-ipc is a Node.js module used for local and remote Inter-Process Communication, enabling different processes to communicate through Unix sockets, Windows named pipes, and TCP/UDP networking.

The package has been infected with infostealer malware containing code to steal AI sessions (Claude Code, Kiro), cloud credentials (AWS, GCP), user application data (Microsoft Teams, FileZilla), browser cookies (Firefox), and configuration data from Docker, Terraform, Kubernetes, and more.

This is not the first time node-ipc has been breached. It was previously attacked and modified to deliver malware during 2022 in the “protestware” malware campaign (CVE-2022-23812).

Who is affected

Anyone who installed node-ipc version 12.0.1 in the last few hours, or any of the following affected versions: 9.1.6, 9.2.3.

Impact

  • The malware steals sensitive information from the target machine.
  • node-ipc has 796,965 weekly downloads, and 3,000,590 monthly downloads.

Immediate Actions:

  1. Revoke keys; add 2FA and downgrade malicious node-ipc versions
  2. Treat the machine and any connected token, environment variable and API key as compromised

Technical Analysis

image

The main file “node-ipc.cjs” contains malicious obfuscated code in the bottom of the file.

image

After deobfuscating the malware, we see it contains a large list of files from which to exfiltrate information. It seems this malware targets macOS specifically, as it exfiltrates files from ~/Library, which is a macOS native directory for installed applications.

More specifically, it targets Firefox, Microsoft Teams, and FileZilla to extract session files and cookies — and also Docker configuration, MySQL history, and npm keys — exfiltrating all of it to a remote server.

image
image
image

The malware also steals SSH keys and Terraform credentials.

image

The stolen data includes Azure, AWS, Claude Code configurations, FileZilla, GitHub credentials, Helm, Ansible and many more.

image
image

The data is being sent to the remote C2 server sh[.]azurestaticprovider[.]net – which might cause security engineers and scanners to think it is related to a real Azure URL instead of a malicious one.

image

Instead of sending the information using a regular HTTP POST request, the malware uses a specialized function that transfers the information over a DNS TXT protocol. This is a highly evasive technique, as DNS TXT requests are usually not monitored by regular network analysis tools, and every “packet” sent is very small, where the remote server requires specific logic to be able to combine and build the information as it’s received on the attacker’s server.

image

Conclusion

In our Bitwarden CLI breach analysis last month we predicted that supply chain attacks are going to get worse, and they are.

Threat actors keep abusing known patterns and files containing sensitive information, targeting developers and users and spreading via the npm registry. The use of heavy obfuscation, a Microsoft Azure lookalike URL, and a highly evasive DNS TXT network protocol for exfiltrating data shows that threat actors will continue their efforts to bypass defenses and make their code increasingly evasive and destructive.

This issue won’t be resolved by users alone. Even if everyone followed best practices and avoided installing compromised versions, we cannot guarantee that at scale. npm and PyPI should move to a protect-first methodology – similar to how Android and iOS applications are reviewed before a new version is released to the app store – which would prevent large-scale malware from affecting millions of users worldwide.

Tags:

post banner image

Run Every Security Test Your Code Needs

Pinpoint, investigate and eliminate code-level issues across the entire SDLC.

GET A PERSONALIZED DEMO
Frame 2085668530

Subscribe to Our Newsletter

Stay updated with the latest SaaS insights, tips, and news delivered straight to your inbox.

Security Starts at the Source