The Java ecosystem, long considered a fortress compared to the wild west of npm, has been breached by a novel and highly sophisticated supply chain attack. A new report from Aikido Security reveals the discovery of a malicious package on Maven Central that masqueraded as the ubiquitous Jackson JSON library, using a subtle “prefix swap” to fool developers.
The package, identified as org.fasterxml.jackson.core/jackson-databind, is a doppelgänger of the legitimate library. By swapping the legitimate com.fasterxml namespace for the attacker-controlled org.fasterxml, the threat actors created a trap that is nearly indistinguishable to the naked eye.
The Jackson library is a cornerstone of modern Java development, making it a high-value target. The attackers capitalized on this by mirroring the naming convention of the real library almost perfectly.
“The typosquatting operates on two levels: the malicious package uses the org.fasterxml.jackson.core namespace, while the legitimate Jackson library is published under com.fasterxml.jackson.core”.
This deception extended to the command-and-control (C2) infrastructure. Just as the package swapped .com for .org, the malware communicated with fasterxml.org instead of the legitimate fasterxml.com. As the report notes, “The .com to .org swap is subtle enough to pass casual inspection but is entirely attacker-controlled”.
Unlike the simple script-kiddie spam often found in other registries, this malware was engineered for evasion and persistence. The package contained a multi-stage payload capable of delivering platform-specific executables.
“The attackers have gone to great lengths to do a multi-staged payload, with encrypted configuration strings, a remote command-and-control server delivering platform-specific executables, and multiple layers of obfuscation designed to frustrate analysis”.
Researchers emphasized the rarity of such an attack in this specific ecosystem. “It’s quite novel, and the first time we’ve detected rather sophisticated malware on Maven Central”.
The incident highlights a glaring gap in the security logic of Java’s reverse-domain namespace convention. While the system is designed to prevent conflicts, it currently lacks mechanisms to flag obvious imposters swapping Top-Level Domains (TLDs).
“This is directly analogous to domain typosquatting (fasterxml.com vs fasterxml.org), but Maven Central appear to currently have no mechanism to detect it”.
Although the malicious package was removed within 1.5 hours of reporting, the technique itself remains a potent threat. The “prefix swap” requires minimal sophistication to execute but offers high potential rewards for attackers targeting other major libraries like Google or Apache.
“This is a simple attack, and we expect copycats… Now that this approach has been documented, we anticipate other attackers will attempt similar prefix swaps against other high-value libraries”.
The report concludes with an urgent call for Maven Central to implement “prefix similarity detection” to flag new packages that mimic high-value namespaces. “The window to implement defenses is now, before this becomes a widespread pattern”.
Related Posts:
- Updatecli Tool Vulnerable to Credential Exposure – CVE-2025-24355
- Cybercriminals Exploit Swap Files: New E-commerce Skimming Tactic
- FCC Takes Aim at SIM Swapping Fraud, Protecting Consumers from Billions in Losses
- Hidden Theft: ‘Crypto Copilot’ Chrome Extension Drains Solana Wallets on X
- Cloudflare’s 1.1.1.1 DNS Suffers Global Outage Due to Internal Configuration Error