:

POPULAR OPEN SOURCE PACKAGE COMPROMISED, STEALING CREDENTIALS

DEV DESK2 MIN READ
MON, APR 27, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

Element-data, an open source package downloaded 1 million times monthly, was found stealing user credentials. Users of the library should immediately check for signs of compromise.

Security researchers discovered that element-data, a widely-used open source package, contained malicious code designed to harvest user credentials. The package, which maintains approximately 1 million monthly downloads, had been compromised without the knowledge of its users or maintainers. ■ The Breach The malicious code embedded in element-data was designed to exfiltrate sensitive user authentication data. The exact scope of affected versions and the duration of the compromise remain under investigation. ■ What You Should Do Users of element-data should take immediate action: - Audit your systems: Check for unauthorized access or activity on accounts that may have used this package - Rotate credentials: Change passwords and regenerate API keys for any services accessed by applications using element-data - Update immediately: Remove the compromised package and update to a patched version when available - Review logs: Examine application logs for suspicious activity dating back to when the package was first installed ■ Impact The large download volume means the potential impact is significant. Any application or service that incorporated element-data could have been affected. Organizations using this package in production environments face particular risk. ■ Next Steps Maintainers have been notified and are working to remediate the issue. Additional details about the compromise timeline and affected versions are expected as the investigation progresses. Users should monitor official package repositories and security advisories for updates. This incident underscores the risks inherent in open source software supply chains, where popular packages can reach millions of users before security issues are detected.

■ SOURCES

Ars Technica

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Threat actors exploited a vulnerability in Robinhood's account creation process to inject phishing messages into legitimate platform emails. Users received fraudulent notifications claiming suspicious account activity, designed to harvest credentials.

JUST NOWAI Desk

The GlassWorm campaign has resurfaced with 73 malicious "sleeper" extensions in the OpenVSX marketplace. These extensions remain dormant until activated through updates, creating a delayed-attack vector.

2H AGOSecurity Desk

A Chinese national accused of conducting cyberespionage for China's intelligence services has been extradited from Italy to face criminal charges in the United States.

2H AGOSecurity Desk

Singapore's Land Transport Authority has suspended a government construction contractor's access to its digital systems following a cybersecurity incident involving the company.

2H AGOSecurity Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.