All news

36 Malicious npm Packages Exploited Redis and PostgreSQL to Deploy Persistent Implants

36 Malicious npm Packages Exploited Redis and PostgreSQL to Deploy Persistent Implants

36 rogue npm packages abused Redis and PostgreSQL connections to plant persistent backdoors. Here is what happened and how to protect your supply chain.

April 5, 2026VibeWShield News Agentthehackernews.com
Editorial note: This article was generated by VibeWShield's AI news agent based on the original report. It has been reviewed for accuracy but may contain AI-generated summaries. Always verify critical details from the original source.

36 Malicious npm Packages Used Your Database as a Backdoor

Thirty-six rogue packages slipped into the npm registry and did something nastier than most supply chain attacks - they didn't just steal env variables and bail. They burrowed into Redis and PostgreSQL instances to plant persistent implants, meaning the payload survived package removal and even container restarts.

This is next-level persistence. Attackers treated your database layer as command-and-control infrastructure, not just a data target.

What Actually Happened

Security researchers identified 36 packages crafted to look like legitimate database utility libraries - the kind of thing a developer installs without a second thought during a late-night sprint.

Once installed, the packages:

  • Connected to any locally accessible Redis or PostgreSQL instance using default or environment-sourced credentials
  • Wrote malicious payloads directly into database storage - using Redis keyspace notifications and PostgreSQL procedural functions as persistence hooks
  • Registered callbacks that re-executed attacker code on database events, surviving even full npm uninstalls
  • Exfiltrated connection strings, secrets, and session tokens back to attacker-controlled infrastructure

The kill move here is using the database itself as the implant host. Delete the npm package - the implant lives on. Wipe the container - if the database volume persists, so does the backdoor.

Why Developers Are the Target

Modern app stacks wire Redis and PostgreSQL directly into local dev environments and CI pipelines with weak or default credentials. Attackers know this. A malicious pg-utils or redis-helper package is a skeleton key to your entire data layer.

How to Harden Your Stack Right Now

  • Audit your package.json and package-lock.json - cross-reference every database-adjacent dependency against the npm advisory database
  • Never run Redis or PostgreSQL with default credentials in any environment - dev included
  • Restrict network access - database ports should not be reachable from arbitrary npm postinstall scripts
  • Use npm audit and tools like Socket.dev to flag packages with unusual install-time behaviors
  • Inspect PostgreSQL functions and Redis keyspace configs for unexpected entries after any new dependency install
  • Pin dependency versions and enable lockfile integrity checks in your CI pipeline using --ci flag
  • Rotate all credentials exposed in environments where these packages ran

The Bigger Picture

Supply chain attackers are getting smarter about persistence. Dropping a malicious file is amateur hour - hijacking your database runtime means the attack outlives the initial infection vector. Treat your database configuration as attack surface, not just application infrastructure.


Is your app vulnerable to similar attacks? Run an automated scan in 3 minutes with VibeWShield.

Free security scan

Is your app vulnerable to similar attacks?

VibeWShield automatically scans for these and 18 other security checks in under 3 minutes.

Scan your app free