A digital illustration of a segmented worm in red tones appears next to the yellow text, Glassworm Hits Popular React Native Packages, on a dark red background.

Glassworm Hits Popular React Native Packages With Credential-Stealing npm Malware

By Published On: March 18, 2026

 

On March 16, 2026, the developer community faced a coordinated supply chain attack that highlighted a critical vulnerability within the software ecosystem. A threat actor, identified as Glassworm, successfully backdoored two widely used React Native npm packages. This malicious intervention transformed benign development tools into potent credential and cryptocurrency stealers, operating silently within compromised projects.

The Glassworm Attack: A Deep Dive into Compromised Packages

The Glassworm operation centered on two specific React Native npm packages: react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8. These packages, crucial for developers integrating country selection and international phone number functionalities into their applications, were published within minutes of each other. The publisher, operating under the alias “AstrOOnauta,” leveraged the trust associated with npm, a widely used package manager for JavaScript, to distribute the malicious code.

This incident underscores the inherent risks in software supply chains, where a single compromised component can propagate malicious functionality across countless downstream applications. Developers often rely on third-party packages to accelerate development, making these dependencies attractive targets for adversaries.

Understanding the Modus Operandi: Credential and Cryptocurrency Theft

The malicious code injected into these packages was designed to exfiltrate sensitive information. While the precise mechanisms employed by Glassworm to steal credentials and cryptocurrency remain under analysis, typical approaches involve:

  • Hooking into network requests to intercept API keys, login tokens, and other authentication data.
  • Scanning for cryptocurrency wallet seeds, private keys, or accessing wallet data stored in application memory or local storage.
  • Establishing command-and-control (C2) communication channels to transmit exfiltrated data to Glassworm’s infrastructure.

The stealthy nature of this attack meant that applications incorporating the backdoored packages could have been silently leaking sensitive user and application data for an unknown period. This makes detection and remediation particularly challenging, emphasizing the need for robust security practices throughout the development lifecycle.

Impact on the React Native Ecosystem

React Native, a popular framework for building mobile applications using JavaScript, boasts a vast and active community. The widespread adoption of npm packages within this ecosystem means that a compromise of widely used components can have far-reaching consequences. Developers and organizations leveraging React Native must be acutely aware of the potential for supply chain attacks like Glassworm.

While the specific impact of this Glassworm campaign is still being assessed, the potential for unauthorized access to user accounts, financial losses, and reputational damage to affected organizations is significant.

Remediation Actions for Developers and Organizations

Immediate action is critical for any developer or organization that may have incorporated these compromised packages. Here’s a structured approach to remediation:

  • Package Audit: Immediately audit your project dependencies to identify if react-native-country-select@0.3.91 or react-native-international-phone-number@0.11.8 are present in your package.json or package-lock.json files.
  • Immediate Removal and Downgrade/Upgrade: If identified, remove the malicious versions. Seek out official, clean versions or consider alternative, well-vetted packages. Closely monitor official announcements from the React Native community or the maintainers (if they were also compromised) for safe versions or remediation guidance.
  • Revoke Credentials: Assume any credentials, API keys, and sensitive tokens used by applications that included the compromised packages have been compromised. Immediately revoke these and generate new ones.
  • User Notification and Password Resets: If user data may have been exposed, transparently notify affected users and recommend immediate password resets.
  • Code Review: Conduct a comprehensive security review of your codebase for any other potential backdoors or suspicious modifications that might have occurred during the compromise period.
  • Enhance Supply Chain Security: Implement stricter controls for package consumption, including:
    • Dependency Scanning: Integrate automated tools to scan for known vulnerabilities in your dependencies.
    • Software Bill of Materials (SBOM): Maintain an accurate SBOM to track all components in your software.
    • Repository Purity: Prioritize packages from reputable publishers with strong security practices and a history of responsive bug fixes.
    • Private Package Registries: For critical internal dependencies, consider maintaining a private npm registry with strict access controls.
  • Monitor for CVEs: Continuously monitor for new CVEs related to your project’s dependencies. While a CVE for this specific incident may not be immediately available, it’s a general best practice. For example, relevant CVEs are tracked at CVE-2023-xxxx (placeholder, as actual CVE is not yet assigned for this specific event).

Tools for Detection and Mitigation

Tool Name Purpose Link
Snyk Dependency vulnerability scanning and remediation advice. https://snyk.io/
Dependabot (GitHub) Alerts for vulnerable dependencies and automated pull requests for updates. https://docs.github.com/en/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates
OWASP Dependency-Check Identifies project dependencies and checks for known vulnerabilities. https://owasp.org/www-project-dependency-check/
npm-audit Built-in npm command to check for vulnerabilities in project dependencies. https://docs.npmjs.com/cli/v9/commands/npm-audit

Building Resilience Against Software Supply Chain Attacks

The Glassworm incident serves as a stark reminder that software supply chain security is paramount. Organizations must shift towards a proactive security posture, treating every third-party component as a potential attack vector. Implementing robust security controls, continuous monitoring, and developer education are not merely best practices but essential survival strategies in an increasingly complex threat landscape.

Maintaining vigilance, conducting thorough security reviews, and utilizing advanced static and dynamic analysis tools for both first-party and third-party code will significantly enhance an organization’s resilience against such sophisticated attacks.

 

Share this article

Leave A Comment