POPULAR OPEN SOURCE PACKAGE COMPROMISED, STEALING CREDENTIALS
DEV DESK■ 2 MIN READ
MON, APR 27, 2026■ AI-SUMMARIZED FROM 1 SOURCE BELOW
Element-data, an open source package downloaded 1 million times monthly, was found stealing user credentials. Users of the library should immediately check for signs of compromise.
Security researchers discovered that element-data, a widely-used open source package, contained malicious code designed to harvest user credentials. The package, which maintains approximately 1 million monthly downloads, had been compromised without the knowledge of its users or maintainers.
■ The Breach
The malicious code embedded in element-data was designed to exfiltrate sensitive user authentication data. The exact scope of affected versions and the duration of the compromise remain under investigation.
■ What You Should Do
Users of element-data should take immediate action:
- Audit your systems: Check for unauthorized access or activity on accounts that may have used this package
- Rotate credentials: Change passwords and regenerate API keys for any services accessed by applications using element-data
- Update immediately: Remove the compromised package and update to a patched version when available
- Review logs: Examine application logs for suspicious activity dating back to when the package was first installed
■ Impact
The large download volume means the potential impact is significant. Any application or service that incorporated element-data could have been affected. Organizations using this package in production environments face particular risk.
■ Next Steps
Maintainers have been notified and are working to remediate the issue. Additional details about the compromise timeline and affected versions are expected as the investigation progresses. Users should monitor official package repositories and security advisories for updates.
This incident underscores the risks inherent in open source software supply chains, where popular packages can reach millions of users before security issues are detected.
■ MORE FROM THE SECURITY DESK
Threat actors exploited a vulnerability in Robinhood's account creation process to inject phishing messages into legitimate platform emails. Users received fraudulent notifications claiming suspicious account activity, designed to harvest credentials.
JUST NOW— AI Desk
The GlassWorm campaign has resurfaced with 73 malicious "sleeper" extensions in the OpenVSX marketplace. These extensions remain dormant until activated through updates, creating a delayed-attack vector.
2H AGO— Security Desk
A Chinese national accused of conducting cyberespionage for China's intelligence services has been extradited from Italy to face criminal charges in the United States.
2H AGO— Security Desk
Singapore's Land Transport Authority has suspended a government construction contractor's access to its digital systems following a cybersecurity incident involving the company.
2H AGO— Security Desk