← Back to Pulse Feed
PULSE DETAIL
Malicious npm packages associated with Namastex.ai were compromised with malware exhibiting tradecraft similar to TeamPCP's CanisterWorm campaign. The attack targeted packages including @automagik/genie and pgserve, implementing install-time execution that harvests credentials, environment variables, SSH keys, cloud credentials, browser data, and crypto-wallet artifacts. The payload exfiltrates stolen data to both a conventional webhook at telemetry.api-monitor.com and an Internet Computer Protocol canister endpoint. It incorporates self-propagation logic to compromise additional npm packages using stolen publishing tokens and includes cross-ecosystem spreading capabilities targeting PyPI. The malware uses hybrid encryption with RSA and AES-256-CBC for data exfiltration. Multiple package namespaces were affected, suggesting shared infrastructure or coordinated compromise across publisher accounts.
MITRE ATT&CK & Malware Families
Indicators of Compromise (9)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-SHA256 | 834b6e5db5710b9308d0598978a0148a9dc832361f1fa0b7ad4343dcceba2812 | — | 2026-04-22 | |
| FileHash-SHA256 | 87259b0d1d017ad8b8daa7c177c2d9f0940e457f8dd1ab3abab3681e433ca88e | — | 2026-04-22 | |
| FileHash-SHA256 | c19c4574d09e60636425f9555d3b63e8cb5c9d63ceb1c982c35e5a310c97a839 | — | 2026-04-22 | |
| URL | http://cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0.io/drop | — | 2026-04-22 | |
| URL | https://telemetry.api-monitor.com/v1/drop | — | 2026-04-22 | |
| URL | https://telemetry.api-monitor.com/v1/telemetry | — | 2026-04-22 | |
| URL | https://telemetry.api-monitor.com/v1/telemetry' | — | 2026-04-22 | |
| hostname | cjn37-uyaaa-aaaac-qgnva-cai.raw.icp0.io | — | 2026-04-22 | |
| hostname | telemetry.api-monitor.com | — | 2026-04-22 |