Bottom Line: While the attack was significant in scope, the impact to end users was minimal due to the frontend-only nature of React Native ARIA libraries and swift response actions. No system-level compromises have been confirmed based on current analysis.
8 additional packages compromised in rapid succession:
7 additional packages targeted:
The compromise occurred through a leaked npm access token belonging to an authorized maintainer. The token lacked two-factor authentication protection.
Primary Infrastructure
136.0.9.8:3306
136.0.9.8:27017Secondary Infrastructure
85.239.62.36:3306
85.239.62.36:27017ss_infoHarvests system metadata including OS info, Node.js version, script paths, and runtime context
ss_ipRetrieves public IP address information via external API calls to ip-api.com
React Native ARIA Packages
GlueStack Packages
%LOCALAPPDATA%\Programs\Python\Python3127If you find any files in this location, your system may be compromised.
package-lock.json and yarn.lock filesTechnical Controls
Process Controls
Mandatory 2FA for all publishing and repository access
Cryptographic signing and continuous security scanning
AI-powered detection and threat intelligence integration
• Aikido Security - For discovering and responsibly disclosing the compromise
• npm Security Team - For rapid response and coordination
• Security Community - For ongoing vigilance and support
• React Native ARIA Users - For patience during remediation
This report represents our current understanding of the incident based on available evidence. We will update this document as additional information becomes available.