In a significant and novel supply chain attack, security researchers have discovered that over 150,000 malicious packages were uploaded to the npm registry. This campaign, described as one of the largest package flooding incidents in open-source history, represents a strategic shift in threat actor motivation. Instead of direct compromise, the attackers' goal was to abuse the economic model of tea.xyz, a Web3 protocol designed to reward open-source contributors. By flooding the registry with self-replicating junk packages linked to their crypto wallets, the attackers aimed to illegitimately farm 'TEA tokens'. This incident highlights the emergence of new threats driven by cryptocurrency incentives that can pollute software ecosystems at an unprecedented scale.
The campaign was first detected in late October 2025 and fully uncovered by November 12. The attackers created numerous developer accounts on npm and used them to publish a massive volume of junk packages. The code within these packages was designed to be self-replicating, automatically generating and publishing even more packages, leading to an exponential flood of malicious content on the registry.
The core of the scheme was the tea.yaml configuration file included in each package. This file linked the package to blockchain wallet addresses controlled by the attackers. The tea.xyz protocol is designed to analyze open-source contributions and distribute 'TEA token' rewards to developers. By creating a vast, interconnected web of seemingly legitimate (but actually worthless) packages, the attackers sought to game this system and siphon cryptocurrency rewards from the ecosystem. Any developer who downloaded and used these packages would unwittingly contribute to the perceived value and activity of the attackers' projects, further fueling the token farming operation.
The attack relied on automation and a deep understanding of the tea.xyz incentive mechanism.
tea.yaml file in each package. This file is used by the tea.xyz protocol to identify the project and its contributors for reward distribution. The attackers populated this file with their own wallet addresses.This incident was uncovered by Amazon Web Services (AWS) security researchers at Amazon Inspector, who utilized a new detection rule combined with AI assistance to flag the highly coordinated and suspicious activity.
T1195.002 - Compromise Software Supply Chain: Compromise Software Development Environment: While not compromising an existing environment, the attackers polluted the public npm registry, which is a core part of the software development environment for millions of developers.T1554 - Compromise Client Software Binary: By publishing malicious packages, the attackers aimed to have them integrated into downstream software, thereby compromising client software binaries.The primary impact of this campaign is the pollution and degradation of trust in the open-source ecosystem. While it did not directly steal user data, it created a massive amount of noise, making it harder for developers to find legitimate packages and for security teams to identify genuine threats. It also successfully abused a system designed to support open-source developers, potentially undermining the viability of such incentive programs in the future. This type of attack represents a systemic risk to software supply chains, where the sheer volume of malicious content can overwhelm defensive measures.
package-lock.json) to ensure that the versions of dependencies do not change unexpectedly, preventing a compromised package from being introduced during a build. This is a form of Application Configuration Hardening (D3-ACH).While not a direct solution, promoting a culture of using signed and verified packages can help raise the bar against untrusted code.
Mapped D3FEND Techniques:
Security teams and registries should continuously audit package publications for anomalous patterns indicative of flooding or abuse.
Use lockfiles to pin dependencies, preventing the automatic introduction of new, potentially malicious packages into a project.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats