Sabotage: Code added to popular NPM package wiped files in Russia and Belarus Logo

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus

0
Free
Updated 11 March 2025
Visit Website

A developer has been caught adding malicious code to a popular open-source package that wiped files on computers located in Russia and Belarus as part of a protest that has enraged many users and raised concerns about the safety of free and open source software. The application, node-ipc, adds remote interprocess communication and neural networking capabilities to other open source code libraries. As a dependency, node-ipc is automatically downloaded and incorporated into other libraries, including ones like Vue.js CLI, which has more than 1 million weekly downloads. A deliberate and dangerous act Two weeks ago, the node-ipc author pushed a new version of the library that sabotaged computers in Russia and Belarus, the countries invading Ukraine and pro

FEATURES

SIMILAR TOOLS

A semi-automatic tool to generate YARA rules from virus samples.

Python wrapper for the Libemu library for analyzing shellcode.

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

A Burp extension to check JWT tokens for potential weaknesses

Binary analysis and management framework for organizing malware and exploit samples.

A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.

A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz

A tool designed to handle archive file data and augment Yara's capabilities.

Code to prevent a managed .NET debugger/profiler from working.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved