Security Disclosure: This repository has been compromised
The repository styled-components/vue-styled-components has been compromised by the PolinRider campaign — a DPRK-linked supply chain operation that has infected 670+ repositories across 347+ users to date.
This is not spam. This disclosure is from the OpenSourceMalware.com research team.
Compromised file
public/fonts/fa-solid-400.woff2 — a malicious binary payload disguised as a Font Awesome web font asset. The file does not contain a legitimate WOFF2 font; it is a binary blob staged in the public/fonts/ directory where it would be served to any site loading this repository's assets.
This is consistent with the PolinRider operator's known practice of staging payloads in unexpected locations (configs, batch files, and now binary asset directories) to evade reviewer attention.
What the malicious file does
PolinRider is a multi-stage DPRK loader that ultimately drops infostealer and credential-harvesting payloads. Known capabilities across the campaign include:
- Browser credential and cookie theft
- Cryptocurrency wallet exfiltration (TRON C2 addresses observed:
TMfKQEd7TJJa5xNZJZ2Lep838vrzrs7mAP, TXfxHUet9pJVU1BgVkBAbrES4YUc1nGzcG)
- Silent git history rewriting via
temp_auto_push.bat to amend and force-push infected commits
- Propagation through
postcss.config.mjs, tailwind.config.js, eslint.config.mjs, next.config.mjs, and babel.config.js injection
Immediate remediation steps
- Delete
public/fonts/fa-solid-400.woff2 from this repository (and replace with a clean copy from the official Font Awesome distribution if needed)
- Audit git history for when the file was introduced and by whom —
git log --all --full-history -- public/fonts/fa-solid-400.woff2
- Force-push to remove the malicious blob from history, then run
git gc --prune=now on mirrors
- Rotate ALL credentials for any maintainer account with push access: GitHub password, Personal Access Tokens, SSH keys, npm tokens
- Enable 2FA / passkeys on every account with push access
- Scan maintainer machines for PolinRider IOCs:
- Files:
temp_auto_push.bat, config.bat
- Strings in config files:
rmcej%otb%, _$_1e42, global['!']='8-270-2'
.gitignore entries hiding config.bat
- Audit other repositories owned by the same maintainer(s) — PolinRider infects every local clone on a compromised machine
A free local scanner is available: https://opensourcemalware.com
Full technical analysis: https://opensourcemalware.com
Disclosed by the OpenSourceMalware.com research team.
Security Disclosure: This repository has been compromised
The repository styled-components/vue-styled-components has been compromised by the PolinRider campaign — a DPRK-linked supply chain operation that has infected 670+ repositories across 347+ users to date.
This is not spam. This disclosure is from the OpenSourceMalware.com research team.
Compromised file
public/fonts/fa-solid-400.woff2— a malicious binary payload disguised as a Font Awesome web font asset. The file does not contain a legitimate WOFF2 font; it is a binary blob staged in thepublic/fonts/directory where it would be served to any site loading this repository's assets.This is consistent with the PolinRider operator's known practice of staging payloads in unexpected locations (configs, batch files, and now binary asset directories) to evade reviewer attention.
What the malicious file does
PolinRider is a multi-stage DPRK loader that ultimately drops infostealer and credential-harvesting payloads. Known capabilities across the campaign include:
TMfKQEd7TJJa5xNZJZ2Lep838vrzrs7mAP,TXfxHUet9pJVU1BgVkBAbrES4YUc1nGzcG)temp_auto_push.batto amend and force-push infected commitspostcss.config.mjs,tailwind.config.js,eslint.config.mjs,next.config.mjs, andbabel.config.jsinjectionImmediate remediation steps
public/fonts/fa-solid-400.woff2from this repository (and replace with a clean copy from the official Font Awesome distribution if needed)git log --all --full-history -- public/fonts/fa-solid-400.woff2git gc --prune=nowon mirrorstemp_auto_push.bat,config.batrmcej%otb%,_$_1e42,global['!']='8-270-2'.gitignoreentries hidingconfig.batA free local scanner is available: https://opensourcemalware.com
Full technical analysis: https://opensourcemalware.com
Disclosed by the OpenSourceMalware.com research team.