Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm Packages
CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm Packages
NEWS

CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm Packages

A novel self-propagating malware dubbed CanisterWorm uses Internet Computer Protocol smart contracts as an untakedownable C2 channel, spreading...

Dylan H.

News Desk

March 22, 2026
4 min read

First-Ever Blockchain C2 Worm Spreads Across npm Ecosystem

A previously undocumented self-propagating malware called CanisterWorm has compromised 47 npm packages, marking the first publicly documented abuse of Internet Computer Protocol (ICP) smart contracts as a command-and-control dead drop resolver. The worm emerged as a follow-on attack from the Trivy security scanner supply chain breach.


AttributeValue
Malware NameCanisterWorm
TypeSelf-propagating supply chain worm
Packages Compromised47 npm packages
C2 InfrastructureICP canister (blockchain smart contract)
AttributionTeamPCP (cloud-focused cybercriminal group)
Persistencesystemd service on Linux hosts
PropagationSteals npm tokens → publishes to new packages
OriginTrivy scanner GitHub Actions breach

How CanisterWorm Propagates

The worm's self-spreading mechanism was first detected in @teale.io/eslint-config versions 1.8.11 and 1.8.12:

  1. Postinstall Hook — When a developer installs a compromised package, the postinstall script triggers index.js
  2. Token Harvesting — A findNpmTokens() function scans the victim's machine for npm authentication tokens (.npmrc files)
  3. Package Infection — Using stolen tokens, the worm publishes backdoored versions of packages the developer has write access to
  4. Downstream Spread — Anyone installing those newly infected packages repeats the cycle

The Blockchain C2 Innovation

What makes CanisterWorm novel is its use of ICP canisters — tamperproof smart contracts on the Internet Computer blockchain — as a dead drop resolver for its command-and-control server:

  • The C2 address is stored in an immutable blockchain contract
  • Traditional takedown requests to hosting providers are ineffective
  • The canister acts as a redirect layer, pointing to the actual C2 infrastructure
  • Operators can update the C2 address via the blockchain without modifying any malware code

Persistence Mechanism

Once installed on a development machine, CanisterWorm establishes persistence through a systemd service that survives reboots and continues to:

  • Monitor for new npm tokens
  • Exfiltrate environment variables and credentials
  • Maintain a reverse shell to the C2 server

Impact AreaDescription
Developer MachinesPersistent backdoor with credential theft
npm Ecosystem47 packages compromised, hundreds of thousands of potential downstream installations
CI/CD PipelinesStolen tokens enable supply chain attacks at scale
Takedown ResistanceBlockchain C2 cannot be disrupted through conventional means
AttributionTeamPCP cloud crime group, linked to broader Trivy campaign

Recommendations

For Developers

  • Audit your npm tokens — revoke and rotate all tokens immediately if you installed any suspicious packages
  • Check .npmrc files for unexpected modifications
  • Review postinstall scripts in dependencies before installing
  • Use npm audit and lockfile-only installs in CI/CD

For Organizations

  • Pin dependency versions and use lockfiles
  • Implement allow-listing for npm package installations
  • Monitor for unexpected npm publish events from developer accounts
  • Scan for systemd services created by non-system processes

Key Takeaways

  1. CanisterWorm is the first malware to use blockchain smart contracts as a C2 channel, creating infrastructure that cannot be taken down through traditional means
  2. Self-propagation via stolen npm tokens means the worm spreads without human intervention
  3. 47 packages confirmed compromised with potentially hundreds of thousands of downstream installations affected
  4. TeamPCP is suspected as the threat actor, linking this to the broader Trivy supply chain compromise
  5. The postinstall hook attack vector remains one of the most dangerous aspects of the npm ecosystem
  6. Developers should immediately rotate npm tokens and audit their published packages for unauthorized versions

Sources

  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm — The Hacker News
  • TeamPCP deploys CanisterWorm on npm following Trivy compromise — Aikido Security
  • CanisterWorm: The Self-Spreading npm Attack — Mend.io
  • CanisterWorm supply chain malware attacks npm — iTnews
#Supply Chain#Malware#npm#Blockchain

Related Articles

Lazarus Group Plants 192 Malicious Packages in npm and PyPI

North Korea's Lazarus Group is running a fake recruitment campaign codenamed Graphalgo, planting 192 malicious packages on npm and PyPI that target...

3 min read

Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

Threat actors known as TeamPCP compromised the Telnyx Python package on PyPI, uploading malicious versions that conceal credential-stealing malware inside a WAV audio file using steganographic techniques.

4 min read

Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub Actions

The Trivy open-source vulnerability scanner was compromised in a supply chain attack by the threat group TeamPCP, which hijacked 75 release tags and...

6 min read
Back to all News