By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
Computing

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

News Room
Last updated: 2025/05/09 at 10:28 AM
News Room Published 9 May 2025
Share
SHARE

May 09, 2025Ravie LakshmananSupply Chain Attack / Malware

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor.

“Disguised as developer tools offering ‘the cheapest Cursor API,’ these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor’s main.js file, and disable auto-updates to maintain persistence,” Socket researcher Kirill Boychenko said.

The packages in question are listed below –

All three packages continue to be available for download from the npm registry. “Aiide-cur” was first published on February 14, 2025. It was uploaded by a user named “aiide.” The npm library is described as a “command-line tool for configuring the macOS version of the Cursor editor.”

Cybersecurity

The other two packages, per the software supply chain security firm, were published a day earlier by a threat actor under the alias “gtr2018.” In total, the three packages have been downloaded over 3,200 times to date.

The libraries, once installed, are designed to harvest user-supplied Cursor credentials and fetch a next-stage payload from a remote server (“t.sw2031[.]com” or “api.aiide[.]xyz”), which is then used to replace a legitimate Cursor-specific code with malicious logic.

“Sw-cur” also takes the step of disabling Cursor’s auto-update mechanism and terminating all Cursor processes. The npm packages then proceed to restart the application so that the patched code takes effect, granting the threat actor to execute arbitrary code within the context of the platform.

“This campaign highlights a growing supply chain threat, with threat actors increasingly using malicious patches to compromise trusted local software,” Boychenko said.

The selling point here is that the attackers are attempting to exploit developers’ interest in AI as well as those who are looking for cheaper usage fees for access to AI models.

“The threat actor’s use of the tagline ‘the cheapest Cursor API’ likely targets this group, luring users with the promise of discounted access while quietly deploying a backdoor,” the researcher added.

The disclosure comes as Socket uncovered two other npm packages – pumptoolforvolumeandcomment and debugdogs – to deliver an obfuscated payload that siphons cryptocurrency keys, wallet files, and trading data related to a cryptocurrency platform named BullX on and macOS systems. The captured data is exfiltrated to a Telegram bot.

While “pumptoolforvolumeandcomment” has been downloaded 625 times, “debugdogs” have received a total of 119 downloads since they were both published to npm in September 2024 by a user named “olumideyo.”

“Debugdogs simply invokes pumptoolforvolumeandcomment, making it a convenient secondary infection payload,” security researcher Kush Pandya said. “This ‘wrapper’ pattern doubles down on the main attack, making it easier to spread under multiple names without changing the core malicious code.”

Cybersecurity

“This highly targeted attack can empty wallets and expose sensitive credentials and trading data in seconds.”

Npm Package “rand-user-agent” Compromised in Supply Chain Attack

The discovery also follows a report from Aikido about a supply chain attack that has compromised a legitimate npm package called “rand-user-agent” to inject code that conceals a remote access trojan (RAT). Versions 2.0.83, 2.0.84, and 1.0.110 have been found to be malicious.

The newly released versions, per security researcher Charlie Eriksen, are designed to establish communications with an external server to receive commands that allow it to change the current working directory, upload files, and execute shell commands. The compromise was detected on May 5, 2025.

At the time of writing, the npm package has been marked deprecated and the associated GitHub repository is also no longer accessible, redirecting users to a 404 page.

It’s currently not clear how the npm package was breached to make the unauthorized modifications. Users who have upgraded to 2.0.83, 2.0.84, or 1.0.110 are advised to downgrade it back to the last safe version released seven months ago (2.0.82). However, doing so does not remove the malware from the system.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Buy Now or Pay More Later? ‘Macroeconomic Uncertainty’ Has Shoppers Anxious
Next Article Our favorite e-reader for kids just got a sweet price drop — save $40 on the Kindle Paperwhite Kids
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Mexico sues Google over 'Gulf of America' label change
News
Pinterest Agreed to Settle Christine Martinez Lawsuit for $34.7 Million
News
Workforce management startup Rippling raises $450M at $16.8B valuation – News
News
YouTube could score big with an exclusive NFL streaming first
News

You Might also Like

Computing

If You’re an Amazon Ring Owner, You May Be an Accidental Spy | HackerNoon

21 Min Read
Computing

15 Best Online Collaboration Tools in 2025 (Free & Paid)

68 Min Read
Computing

Go 1.23: The New, Unique Package That Comes With It | HackerNoon

10 Min Read
Computing

wasm32-unknown-unknown – The C ABI Changes That You Need to Know About | HackerNoon

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?