Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Fusion between culture and modernity as children dance in Kenya’s refugee camp

June 27, 2025

Former Amazon CEO Bezos’ wedding brings celebrities and glitterati to Venice, Italy

June 27, 2025

Anna Wintour seeks leader to steer day-to-day operations at Vogue

June 26, 2025
Facebook X (Twitter) Instagram
Trending
  • Fusion between culture and modernity as children dance in Kenya’s refugee camp
  • Former Amazon CEO Bezos’ wedding brings celebrities and glitterati to Venice, Italy
  • Anna Wintour seeks leader to steer day-to-day operations at Vogue
  • Kim Kardashian, Oprah Winfrey And Tom Brady Arrive In Venice
  • Supreme Court to decide birthright citizenship, other cases
  • Adults with ADHD find ways to stay focused at work
  • Tania León and Maria Teresa Kumar among Carnegie’s 2025 ‘Great Immigrants, Great Americans’ honorees
  • Issey Miyake showcases men’s collection at the Cartier Foundation
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, June 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Malicious NPM Packages Target Cursor AI’s macOS Users
Cybersecurity

Malicious NPM Packages Target Cursor AI’s macOS Users

adminBy adminMay 9, 2025No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 34


Three malicious NPM packages posing as developer tools for the popular Cursor AI code editor were caught deploying a backdoor on macOS systems, vulnerability detection firm Socket reports.

Cursor is a proprietary integrated development environment (IDE) that integrates AI features directly within the coding environment. It offers tiered access to LLMs, with premium language models priced per request.

The packages, named sw‑cur, sw‑cur1, and aiide-cur, claim to provide cheap access to Cursor, exploiting the developers’ interest in avoiding paying the fees.

All three packages were published by a threat actor using the NPM usernames gtr2018 and aiide, and have amassed over 3,200 downloads to date.

“As of this writing, these packages remain live on the NPM registry. We have formally petitioned for their removal,” Socket warns.

Upon execution, a malicious script contained by these packages harvests user credentials, fetches a payload from a remote server and decrypts and decompresses it.

It also replaces Cursor code with malicious code supplied by the attacker, and restarts the application to obtain persistent remote execution capabilities within the IDE.

Additionally, the vulnerability detection firm noticed that sw‑cur would disable Cursor’s auto-update mechanism, likely to prevent removal.

Advertisement. Scroll to continue reading.

“The attack specifically targets macOS installations of this application by modifying internal files such as main.js under the /Applications/Cursor.app/… path. The malware uses the editor’s trusted runtime to execute threat actor-controlled code and maintain persistence,” Socket notes.

All three packages use the same credential exfiltration, payload retrieval, decryption, and file-patching routines, albeit they use different hardcoded domains.

The attack, Socket warns, could lead not only to credential and code theft, or additional malware infections, but also to unauthorized access to paid services and any codebase opened within the IDE.

“In enterprise environments or open source projects, the risks multiply. A trojanized IDE on a developer’s machine can leak proprietary source code, introduce malicious dependencies into builds, or serve as a foothold for lateral movement within CI/CD pipelines,” Socket notes.

Cursor users who downloaded any of these packages are advised to restore Cursor from a trusted source, rotate credentials, and audit their code for potential unauthorized changes.

Related: Hundreds Download Malicious NPM Package Capable of Delivering Rootkit

Related: Dozens of Malicious NPM Packages Steal User, System Data

Related: Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs

Related: Malicious NPM, PyPI Packages Stealing User Information



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Kim Kardashian, Oprah Winfrey And Tom Brady Arrive In Venice

June 26, 2025

Topline Celebrities and billionaires have arrived in Venice ahead of Amazon billionaire Jeff Bezos’ extravagant—and…

Forbes’ Richest Self-Made Women In The World 2025

June 25, 2025

Here’s How Much New York City Mayoral Candidate Zohran Mamdani Is Worth

June 25, 2025

Hims & Hers CEO No Longer A Billionaire After Novo Nordisk Deal Collapses

June 23, 2025
Our Picks

Fusion between culture and modernity as children dance in Kenya’s refugee camp

June 27, 2025

Former Amazon CEO Bezos’ wedding brings celebrities and glitterati to Venice, Italy

June 27, 2025

Anna Wintour seeks leader to steer day-to-day operations at Vogue

June 26, 2025

Kim Kardashian, Oprah Winfrey And Tom Brady Arrive In Venice

June 26, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.