Malicious NPM Packages Caught Exfiltrating Kubernetes Config, SSH Keys
The malicious software packages impersonate legitimate JavaScript libraries and components, but upon installation, they run obfuscated code to collect and siphon sensitive files.