{"id":10575,"date":"2025-09-29T15:19:06","date_gmt":"2025-09-29T15:19:06","guid":{"rendered":"https:\/\/www.binaryconfidence.com\/?p=10575"},"modified":"2025-11-24T12:11:40","modified_gmt":"2025-11-24T12:11:40","slug":"npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam","status":"publish","type":"post","link":"https:\/\/www.binaryconfidence.com\/en\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/","title":{"rendered":"NPM Attack: When Supplier Code Turns Against You"},"content":{"rendered":"<p><em>On September 8, 2025, part of the software packages in the world\u2019s largest repository, npm, was compromised. The attackers gained access in the most ordinary way: a targeted phishing attack successfully broke into the account of a respected contributor. The security community quickly uncovered the attack, which kept the consequences minimal. But for a brief moment, the digital supply chain that underpins the entire software ecosystem turned against business.<\/em><\/p>\n<p>The attackers focused on maintainers of popular packages. One of them received a phishing email from a fake domain, which at first glance looked like an official request to update two-factor authentication. He fell for it, and the attackers gained access to his account. They then inserted malicious code into 18 well-known packages.<\/p>\n<p>&nbsp;<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-10576\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/joshjunon-X-300x226.png\" alt=\"\" width=\"300\" height=\"226\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/joshjunon-X-300x226.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/joshjunon-X-16x12.png 16w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/joshjunon-X.png 751w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>These libraries see billions of downloads each month and form the foundation of thousands of other projects, which dramatically increased the potential impact. The malware was designed to target crypto wallets: it intercepted web API calls and changed wallet addresses so that money meant for users or businesses was redirected to the attackers.<\/p>\n<p>The spread was fast and massive. Automated CI\/CD pipelines pulled the infected versions into tens of thousands of builds <a href=\"https:\/\/vercel.com\/blog\/critical-npm-supply-chain-attack-response-september-8-2025\">Vercel confirmed<\/a>that more than 70 teams had already integrated the malicious versions before the problem was spotted. Within hours of the first distribution, warnings began to circulate, and the maintainer known as Junon deleted nearly all of the compromised packages. The repository admin blocked his account, but later the same day it was restored and the packages were cleaned of malicious code. Financial losses were estimated at around USD 970 \u2014 a trivial sum compared to what might have happened if the attack had lasted longer.<\/p>\n<p><a href=\"https:\/\/github.blog\/security\/supply-chain-security\/our-plan-for-a-more-secure-npm-supply-chain\/\">As a direct response to the npm incident, GitHub announced<\/a>that it will strengthen authentication and publishing processes. For local publishing, it will require two-factor authentication (2FA) and short-lived granular tokens valid for only seven days. At the same time, it is introducing mandatory trusted publishing directly from CI\/CD pipelines using OpenID Connect (OIDC).<\/p>\n<p>&nbsp;<\/p>\n<h3>You\u2019re Only as Strong as Your Weakest Supplier<\/h3>\n<p>When the software supply chain is breached, the consequences don\u2019t stop at financial losses or stolen crypto wallets. The real problem is that attackers gain access directly to the base code relied upon by countless companies and end users \u2014 from communications and manufacturing to logistics, transport, and service delivery. Your product or service could be weaponized in an attack without you even realizing it.<\/p>\n<p>Compromised code often ends up on darknet forums, for example in China or Russia, where it becomes a \u201cproduct for rent\u201d for other criminals to use in phishing campaigns, data theft, or ransomware. At that point, your reputation no longer matters \u2014 your code has become part of the cybercrime ecosystem, traded like a commodity.<\/p>\n<p>The legal and regulatory risks are also significant. If it turns out your product shipped with compromised code and attackers used it to access personal data, you could face fines under GDPR or similar laws. In practice, this means not only financial penalties but also long-term loss of trust from clients and partners.<\/p>\n<p>The npm attack highlights an uncomfortable truth: institutions and companies are only as secure as their weakest supplier. This holds true even for suppliers buried deep within your software. Supply chain compromises bring several major risks:<\/p>\n<ul>\n<li><strong>Reputa\u010dn\u00e9 riziko<\/strong> \u2013 If your app contains compromised code, customers won\u2019t care that it \u201cwasn\u2019t your fault.\u201d They see your brand as endangering their money or data. And reputation can vanish in seconds.<\/li>\n<li><strong>Regula\u010dn\u00e9 riziko,<\/strong> \u2013 In the EU, for example, the Cyber Resilience Act makes it clear that companies must know and control what\u2019s inside their software.<\/li>\n<li><strong>Finan\u010dn\u00e9 riziko,<\/strong> \u2013 Attacks can directly reroute customer funds. Even if direct losses are small, the costs of legal disputes and incident response can be huge.<\/li>\n<li><strong>Prev\u00e1dzkov\u00e9 riziko<\/strong> \u2013 CI\/CD pipelines are great for speed, but if malicious code enters the chain, it spreads within hours, not days.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Improving Security Isn\u2019t Rocket Science<\/h3>\n<p class=\"translation-block\">At <strong>Binary Confidence<\/strong>, we face these risks daily across industries. Our mix of <strong>SOC monitoring, GRC services, and CISO advisory<\/strong> is designed to help companies not just during incidents, but also in building resilience beforehand. Supply chain attacks can be mitigated in several ways, and proven practices exist that significantly reduce risk:<\/p>\n<h4><strong>The \u201cminimum release day\u201d rule<\/strong><\/h4>\n<p>Attackers often strike right after updates are published. Many teams have CI\/CD set to update immediately after release. Adding even a short delay before deploying new versions gives the community and security teams time to spot malicious code.<\/p>\n<h4><strong>Avoiding the very latest version by default<\/strong><\/h4>\n<p>For routine maintenance, it\u2019s often safer to stay 1\u20132 versions behind and deploy those already tested by time \u2014 unless a high-severity vulnerability forces immediate action. The key is to monitor security channels, mailing lists, and CVE databases so you know when to wait and when to act.<\/p>\n<h4><strong>Verifying suppliers and packages<\/strong><\/h4>\n<p>Beyond delaying releases, it\u2019s critical to check where packages come from and whether they\u2019re maintained by trusted contributors. Automated tools can monitor integrity and reputation, but best practice combines these with in-house monitoring and SOC oversight.<\/p>\n<p class=\"translation-block\">If you suspect your systems have been targeted or you want to proactively strengthen your cyber defenses, <a href=\"https:\/\/www.binaryconfidence.com\/en\/kontakt\/\" target=\"_self\">reach out to us.<\/a> We know who we\u2019re dealing with. And we know how to fight back. We were the first company in Slovakia to provide <a href=\"https:\/\/www.binaryconfidence.com\/en\/socaas\/\" target=\"_self\">SOC services,<\/a> and we\u2019ve been actively protecting against cyber threats for years. We monitor hacker groups closely, stay connected to intelligence databases and analysis networks, and follow channels that help uncover cybercriminals.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-10526 size-full\" src=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-scaled.png\" alt=\"\" width=\"2560\" height=\"178\" srcset=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-scaled.png 2560w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-300x21.png 300w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-1024x71.png 1024w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-768x53.png 768w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-1536x107.png 1536w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-2048x142.png 2048w, https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/08\/EU-Funding-Logos-18x1.png 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p>The project funded through grant agreement number 101145856 is supported by the European Cybersecurity Competence Centre.<\/p>","protected":false},"excerpt":{"rendered":"<p>8. septembra 2025 bola kompromitovan\u00e1 \u010das\u0165 softv\u00e9rov\u00fdch bal\u00ed\u010dkov najv\u00e4\u010d\u0161om softv\u00e9rovom repozit\u00e1ri sveta npm. \u00dato\u010dn\u00edkom sa prienik podaril tou najzvy\u010dajnej\u0161ou cestou: Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z re\u0161pektovan\u00fdch prispievate\u013eov do repozit\u00e1ra. \u00datok pomerne r\u00fdchlo odhalila bezpe\u010dnostn\u00e1 komunita a aj preto boli jeho d\u00f4sledky minim\u00e1lne. Na kr\u00e1tky moment sa ale digit\u00e1lny dod\u00e1vate\u013esk\u00fd re\u0165azec, na ktorom [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10585,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[20],"tags":[],"class_list":["post-10575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spravy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m - Binary Confidence<\/title>\n<meta name=\"description\" content=\"\u00dato\u010dn\u00edkom sa prienik do najv\u00e4\u010d\u0161ieho softwareov\u00e9ho repozit\u00e1ra npm podaril tou najzvy\u010dajnej\u0161ou cestou. Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z prispievate\u013eov.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binaryconfidence.com\/en\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m - Binary Confidence\" \/>\n<meta property=\"og:description\" content=\"\u00dato\u010dn\u00edkom sa prienik do najv\u00e4\u010d\u0161ieho softwareov\u00e9ho repozit\u00e1ra npm podaril tou najzvy\u010dajnej\u0161ou cestou. Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z prispievate\u013eov.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binaryconfidence.com\/en\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/\" \/>\n<meta property=\"og:site_name\" content=\"Binary Confidence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BinConf\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-29T15:19:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T12:11:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/signal-2025-09-30-125954_002.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"root\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:site\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"root\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/\"},\"author\":{\"name\":\"root\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\"},\"headline\":\"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m\",\"datePublished\":\"2025-09-29T15:19:06+00:00\",\"dateModified\":\"2025-11-24T12:11:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/\"},\"wordCount\":1379,\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/signal-2025-09-30-125954_002.webp\",\"articleSection\":[\"Spr\u00e1vy\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/\",\"name\":\"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m - Binary Confidence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/signal-2025-09-30-125954_002.webp\",\"datePublished\":\"2025-09-29T15:19:06+00:00\",\"dateModified\":\"2025-11-24T12:11:40+00:00\",\"description\":\"\u00dato\u010dn\u00edkom sa prienik do najv\u00e4\u010d\u0161ieho softwareov\u00e9ho repozit\u00e1ra npm podaril tou najzvy\u010dajnej\u0161ou cestou. Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z prispievate\u013eov.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/signal-2025-09-30-125954_002.webp\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/signal-2025-09-30-125954_002.webp\",\"width\":1536,\"height\":1024,\"caption\":\"NPM malware illustration \u2013 visual of a security threat in open-source JavaScript packages, representing supply chain vulnerabilities.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"name\":\"Binary Confidence\",\"description\":\"Binary Confidence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.binaryconfidence.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\",\"name\":\"Binary Confidence\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"caption\":\"Binary Confidence\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BinConf\",\"https:\\\/\\\/x.com\\\/binaryconf\",\"https:\\\/\\\/www.youtube.com\\\/@binaryconfidence\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/binary-confidence\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\",\"name\":\"root\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"caption\":\"root\"},\"sameAs\":[\"https:\\\/\\\/www.binaryconfidence.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m - Binary Confidence","description":"\u00dato\u010dn\u00edkom sa prienik do najv\u00e4\u010d\u0161ieho softwareov\u00e9ho repozit\u00e1ra npm podaril tou najzvy\u010dajnej\u0161ou cestou. Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z prispievate\u013eov.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binaryconfidence.com\/en\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/","og_locale":"en_GB","og_type":"article","og_title":"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m - Binary Confidence","og_description":"\u00dato\u010dn\u00edkom sa prienik do najv\u00e4\u010d\u0161ieho softwareov\u00e9ho repozit\u00e1ra npm podaril tou najzvy\u010dajnej\u0161ou cestou. Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z prispievate\u013eov.","og_url":"https:\/\/www.binaryconfidence.com\/en\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/","og_site_name":"Binary Confidence","article_publisher":"https:\/\/www.facebook.com\/BinConf","article_published_time":"2025-09-29T15:19:06+00:00","article_modified_time":"2025-11-24T12:11:40+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/signal-2025-09-30-125954_002.webp","type":"image\/webp"}],"author":"root","twitter_card":"summary_large_image","twitter_creator":"@binaryconf","twitter_site":"@binaryconf","twitter_misc":{"Written by":"root","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#article","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/"},"author":{"name":"root","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514"},"headline":"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m","datePublished":"2025-09-29T15:19:06+00:00","dateModified":"2025-11-24T12:11:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/"},"wordCount":1379,"publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/signal-2025-09-30-125954_002.webp","articleSection":["Spr\u00e1vy"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/","url":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/","name":"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m - Binary Confidence","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#primaryimage"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/signal-2025-09-30-125954_002.webp","datePublished":"2025-09-29T15:19:06+00:00","dateModified":"2025-11-24T12:11:40+00:00","description":"\u00dato\u010dn\u00edkom sa prienik do najv\u00e4\u010d\u0161ieho softwareov\u00e9ho repozit\u00e1ra npm podaril tou najzvy\u010dajnej\u0161ou cestou. Cielen\u00fd phishingov\u00fd \u00fatok \u00faspe\u0161ne prelomil \u00fa\u010det jedn\u00e9ho z prispievate\u013eov.","breadcrumb":{"@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#primaryimage","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/signal-2025-09-30-125954_002.webp","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2025\/09\/signal-2025-09-30-125954_002.webp","width":1536,"height":1024,"caption":"NPM malware illustration \u2013 visual of a security threat in open-source JavaScript packages, representing supply chain vulnerabilities."},{"@type":"BreadcrumbList","@id":"https:\/\/www.binaryconfidence.com\/npm-utok-ked-dodavatelsky-kod-pracuje-proti-vam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binaryconfidence.com\/"},{"@type":"ListItem","position":2,"name":"NPM \u00fatok: Ke\u010f dod\u00e1vate\u013esk\u00fd k\u00f3d pracuje proti v\u00e1m"}]},{"@type":"WebSite","@id":"https:\/\/www.binaryconfidence.com\/#website","url":"https:\/\/www.binaryconfidence.com\/","name":"Binary Confidence","description":"Binary Confidence","publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binaryconfidence.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.binaryconfidence.com\/#organization","name":"Binary Confidence","url":"https:\/\/www.binaryconfidence.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","caption":"Binary Confidence"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BinConf","https:\/\/x.com\/binaryconf","https:\/\/www.youtube.com\/@binaryconfidence","https:\/\/www.linkedin.com\/company\/binary-confidence\/"]},{"@type":"Person","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514","name":"root","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","caption":"root"},"sameAs":["https:\/\/www.binaryconfidence.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/10575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/comments?post=10575"}],"version-history":[{"count":12,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/10575\/revisions"}],"predecessor-version":[{"id":10775,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/10575\/revisions\/10775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media\/10585"}],"wp:attachment":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media?parent=10575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/categories?post=10575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/tags?post=10575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}