Aikido

duckdb npm packages compromised

Written by
Charlie Eriksen

Over night, starting at 01:16 UTC on September 9th, we were alerted to more packages being compromised, these included:

These packages all had a new version 1.3.3 released (In the case of the wasm version, it was version 1.29.2), which contained the same malicious code as we saw in the compromise of packages with 2 billion+ downloads.

Malicious payload

The payload observed in this attack is virtually identical to the one previously documented, trying to drain crypto wallets. It's an interesting choice to deploy this payload inside a package like duckdb, given that this will primarily run on a backend. It suggests that the attackers may not be very aware of what they are actually doing.

Vendor response

At the time of writing, the only indication that something has occured is the fact that the vendor has marked the latest release as deprecated:

The vendor also released an advisory on GitHub about the incident:

How to phish a duck?

Based on the registry data from npm, the malicious package was submitted by the user duckdb_admin, which has the email quack [at] duckdb.org . Given that the other compromises were achieved through phishing, it appears that this time the duck itself got phished, hook, line, and sinker. The hunter became the hunted, and the poor duck waddled straight into the net (It’s been a long night).

Share:

https://www.aikido.dev/blog/duckdb-npm-packages-compromised

Subscribe for threat news.

Start today, for free.

Start for Free
No CC required
4.7/5
Tired of false positives?

Try Aikido like 100k others.
Start Now
Get a personalized walkthrough

Trusted by 100k+ teams

Book Now
Scan your app for IDORs and real attack paths

Trusted by 100k+ teams

Start Scanning
See how AI pentests your app

Trusted by 100k+ teams

Start Testing

Get secure now

Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

No credit card required | Scan results in 32secs.