{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiabbs4e6kjnzk7zmd4a5eqdflb6hlruzvajg2e2xiv2tl6s2zlabi",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mhzn4angj6s2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiddasxn5ftiuejchw3lv37c7eppeqjndal7carh6322p4lltawocy"
},
"mimeType": "image/jpeg",
"size": 81097
},
"path": "/ghost-campaign-npm-progress-bars-phish-sudo-passwords/",
"publishedAt": "2026-03-27T00:17:46.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Malware",
"Phishing Scam",
"Cyber Attack",
"Cybersecurity",
"Developers",
"NPM",
"Phishing",
"Scam",
"security",
"Sudo"
],
"textContent": "ReversingLabs researchers identify a new Ghost campaign using fake npm install logs and progress bars to phish for sudo passwords and steal crypto wallets from developers.",
"title": "New Ghost Campaign Uses Fake npm Progress Bars to Phish Sudo Passwords"
}