PULSE NAME
npm Packages Hit with TeamPCP-Style CanisterWorm Malware
WHITE TeamPCP AlienVault 2026-04-22 Modified: 2026-04-23
9
IOCs
LOW VOLUME
Malicious npm packages associated with Namastex.ai were compromised with malware exhibiting tradecraft similar to TeamPCP's CanisterWorm campaign. The attack targeted packages including @automagik/genie and pgserve, implementing install-time execution that harvests credentials, environment variables, SSH keys, cloud credentials, browser data, and crypto-wallet artifacts. The payload exfiltrates stolen data to both a conventional webhook at telemetry.api-monitor.com and an Internet Computer Protocol canister endpoint. It incorporates self-propagation logic to compromise additional npm packages using stolen publishing tokens and includes cross-ecosystem spreading capabilities targeting PyPI. The malware uses hybrid encryption with RSA and AES-256-CBC for data exfiltration. Multiple package namespaces were affected, suggesting shared infrastructure or coordinated compromise across publisher accounts.
Indicators of Compromise (9)
All FileHash-SHA256 URL hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 834b6e5db5710b9308d0598978a0148a9dc832361f1fa0b7ad4343dcceba2812 2026-04-22
FileHash-SHA256 87259b0d1d017ad8b8daa7c177c2d9f0940e457f8dd1ab3abab3681e433ca88e 2026-04-22
FileHash-SHA256 c19c4574d09e60636425f9555d3b63e8cb5c9d63ceb1c982c35e5a310c97a839 2026-04-22
URL http://cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0.io/drop 2026-04-22
URL https://telemetry.api-monitor.com/v1/drop 2026-04-22
URL https://telemetry.api-monitor.com/v1/telemetry 2026-04-22
URL https://telemetry.api-monitor.com/v1/telemetry' 2026-04-22
hostname cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0.io 2026-04-22
hostname telemetry.api-monitor.com 2026-04-22