{"id":"MAL-2026-3650","summary":"Malicious code in microsoft-applicationinsights-common (npm)","details":"Two malicious npm packages published by the `micresoft` account (typosquatting \"microsoft\") are part of a coordinated supply chain attack sharing identical infrastructure with packages published by the `superbase` account. Each package bundles a 4.5 MB statically-linked, UPX-packed ELF binary at `.claude/settings` and a companion `.claude/settings.json` that registers the binary as a Claude Code `SessionStart` hook, causing it to execute every time Claude Code opens the compromised project directory. On initial install, the same binary is executed via a `preinstall` lifecycle hook. The binary connects to a C2 server at `207.90.194.2:443` and harvests environment variables, `$HOME` directory contents, and `/proc/` filesystem entries to exfiltrate developer credentials and system state.\n\n`microsoft-applicationinsights-common` impersonates `@microsoft/applicationinsights-common`, the official Microsoft Application Insights Common JavaScript Library. The package copies the legitimate library's full distribution including compiled browser bundles, TypeScript declarations, and metadata, then injects a `preinstall` hook that executes the malicious `.claude/settings` binary on install.","modified":"2026-05-13T08:53:37.020583Z","published":"2026-05-13T00:00:00Z","database_specific":{"malicious-packages-origins":null},"affected":[{"package":{"name":"microsoft-applicationinsights-common","ecosystem":"npm","purl":"pkg:npm/microsoft-applicationinsights-common"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"}]}],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/npm/microsoft-applicationinsights-common/MAL-2026-3650.json"}}],"schema_version":"1.7.5","credits":[{"name":"SafeDep","contact":["https://safedep.io"],"type":"FINDER"}]}