Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Tensions hit cricket leagues on both sides of the border – Sport

May 10, 2025

In coffee-producing Uganda, an emerging sisterhood wants more women involved

May 10, 2025

People moving into the South change the famous US dialect

May 10, 2025
Facebook X (Twitter) Instagram
Trending
  • Tensions hit cricket leagues on both sides of the border – Sport
  • In coffee-producing Uganda, an emerging sisterhood wants more women involved
  • People moving into the South change the famous US dialect
  • Newark Mayor Ras Baraka arrested during ICE detention centre protest | Migration News
  • Columbia suspends over 65 students following pro-Palestinian protest in library
  • US reports second air traffic control outage at New Jersey airport | Donald Trump News
  • Mexico is suing Google over ‘Gulf of America’ label, Sheinbaum says | US-Mexico Border News
  • Google I/O 2025: What to expect, including updates to Gemini and Android 16
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Saturday, May 10
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Malicious NPM Packages Target Cursor AI’s macOS Users
Cybersecurity

Malicious NPM Packages Target Cursor AI’s macOS Users

adminBy adminMay 9, 2025No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 5


Three malicious NPM packages posing as developer tools for the popular Cursor AI code editor were caught deploying a backdoor on macOS systems, vulnerability detection firm Socket reports.

Cursor is a proprietary integrated development environment (IDE) that integrates AI features directly within the coding environment. It offers tiered access to LLMs, with premium language models priced per request.

The packages, named sw‑cur, sw‑cur1, and aiide-cur, claim to provide cheap access to Cursor, exploiting the developers’ interest in avoiding paying the fees.

All three packages were published by a threat actor using the NPM usernames gtr2018 and aiide, and have amassed over 3,200 downloads to date.

“As of this writing, these packages remain live on the NPM registry. We have formally petitioned for their removal,” Socket warns.

Upon execution, a malicious script contained by these packages harvests user credentials, fetches a payload from a remote server and decrypts and decompresses it.

It also replaces Cursor code with malicious code supplied by the attacker, and restarts the application to obtain persistent remote execution capabilities within the IDE.

Additionally, the vulnerability detection firm noticed that sw‑cur would disable Cursor’s auto-update mechanism, likely to prevent removal.

Advertisement. Scroll to continue reading.

“The attack specifically targets macOS installations of this application by modifying internal files such as main.js under the /Applications/Cursor.app/… path. The malware uses the editor’s trusted runtime to execute threat actor-controlled code and maintain persistence,” Socket notes.

All three packages use the same credential exfiltration, payload retrieval, decryption, and file-patching routines, albeit they use different hardcoded domains.

The attack, Socket warns, could lead not only to credential and code theft, or additional malware infections, but also to unauthorized access to paid services and any codebase opened within the IDE.

“In enterprise environments or open source projects, the risks multiply. A trojanized IDE on a developer’s machine can leak proprietary source code, introduce malicious dependencies into builds, or serve as a foothold for lateral movement within CI/CD pipelines,” Socket notes.

Cursor users who downloaded any of these packages are advised to restore Cursor from a trusted source, rotate credentials, and audit their code for potential unauthorized changes.

Related: Hundreds Download Malicious NPM Package Capable of Delivering Rootkit

Related: Dozens of Malicious NPM Packages Steal User, System Data

Related: Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs

Related: Malicious NPM, PyPI Packages Stealing User Information



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak

May 9, 2025

Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

May 9, 2025

160,000 Impacted by Valsoft Data Breach

May 9, 2025

Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits

May 9, 2025

SAP Zero-Day Targeted Since January, Many Sectors Impacted 

May 9, 2025

Company and Personal Data Compromised in Recent Insight Partners Hack 

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

Tensions hit cricket leagues on both sides of the border – Sport

May 10, 2025

In coffee-producing Uganda, an emerging sisterhood wants more women involved

May 10, 2025

People moving into the South change the famous US dialect

May 10, 2025

Newark Mayor Ras Baraka arrested during ICE detention centre protest | Migration News

May 9, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Google I/O 2025: What to expect, including updates to Gemini and Android 16

May 9, 2025

SoundCloud changes policies to allow AI training on user content

May 9, 2025

DeepSeek: Everything you need to know about the AI chatbot app

May 9, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.