The typosquatted packages auto-execute on installation, fingerprint victims by IP, and deploy a PyInstaller binary to harvest ...
An advanced malware campaign on the npm registry steals the very keys that control enterprise cloud infrastructure.