5 Alarming Ways Malicious NPM Packages Compromise PayPal User Data




Google News

Introduction

FortiGuard Labs, the AI-driven threat intelligence division of Fortinet, has recently unveiled a distressing series of npm packages engineered to siphon confidential information from unsuspecting developers and PayPal users.

These nefarious packages were deployed between March 5 and March 14, 2025, by an individual or group operating under aliases such as tommyboy_h1 and tommyboy_h2. An in-depth investigation suggests that these aliases may be operated by a single entity.

The Threat Unveiled

The core of the scam lies in the packages’ names, such as oauth2-paypal and buttonfactoryserv-paypal, crafted to leverage PayPal’s trusted reputation. This deceit not only aids in their installation but helps them stay under the radar, posing as legitimate tools.

Once these packages are unwittingly installed, they execute a malicious script through a pre-installation hook, secretly harvesting critical system data from usernames to system paths—all without the user’s immediate knowledge.

This expert analysis by FortiGuard Labs shares that post-extraction, the data undergoes encryption and obfuscation, significantly hampering detection efforts by security software. This stolen data has potential uses ranging from direct financial theft to broader cybercriminal activities.

Comprehensive Findings

The quick succession in which these harmful packages were published points to a well-orchestrated operation by the threat actor(s). These packages are particularly dangerous for small to medium-sized businesses, exploiting the inherent trust within the open-source community.

  • oauth2-paypal v699.0.0
  • buttonfactoryserv-paypal v3.50.0 and v3.99.0
  • tommyboytesting variants – All embedded with identical malicious code.

Fortinet’s advanced machine learning algorithms have successfully recognized and flagged these malicious entities, thereby offering the latest protections against them.

Actionable Guidelines

To fend off such advanced threats, FortiGuard Labs advocates the following proactive measures:

  • Exercise caution and perform due diligence before incorporating any third-party npm packages, especially those that are seemingly PayPal related.
  • Keep a vigilant watch over network activity, especially noting unforeseen requests or data transmissions to unrecognized servers.
  • Immediate eradication of any malicious packages detected, coupled with comprehensive security checks to prevent further infiltration.
  • Stay updated with the latest security patches and updates from trusted cybersecurity providers like Fortinet.

Indicators of Compromise

Below is a detailed list of compromised items—along with their unique identifiers—which should be flagged for security risks:


File Hash (sha256) Detection
buttonfactoryserv-paypal_3.50.0 18e45358462363996688ceabfc098e17f855d73842f460b34c683e58c728149f Bash/TommyBoy.A!tr

Stay ahead of cyber threats by following us on Google News, LinkedIn, and X.

Related: Sophisticated Microsoft Teams Phishing Attack Unveils Innovative Malware Technique

Last Updated: April 12, 2025