#supply-chain-attack

[ follow ]
Information security
fromDeveloper Tech News
1 day ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
#malware
Information security
fromSecurityWeek
1 day ago

1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

Over 1,800 developers were impacted by the Mini Shai-Hulud supply chain attack affecting multiple package ecosystems.
Information security
fromInfoWorld
1 week ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromThe Hacker News
1 month ago

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Speagle malware hijacks Cobra DocGuard infrastructure to harvest and exfiltrate sensitive data while masking communications as legitimate server traffic.
Information security
fromTechzine Global
1 month ago

GlassWorm malware surfaces in development environments

GlassWorm operation compromised over 400 software components across GitHub, npm, and development marketplaces using supply-chain attacks and blockchain-based command-and-control infrastructure.
Information security
fromSecurityWeek
2 days ago

Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

A critical vulnerability in Gemini CLI allows remote code execution, enabling attackers to exploit CI/CD pipelines for supply chain attacks.
#cybersecurity
Information security
fromThe Hacker News
1 month ago

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google attributes the Axios npm package compromise to North Korean threat actor UNC1069, highlighting the risks of supply chain attacks.
Information security
fromThe Hacker News
2 days ago

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware

A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
Information security
fromArs Technica
3 days ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Checkmarx and Bitwarden were compromised in a supply chain attack linked to TeamPCP, highlighting vulnerabilities in security tools.
Information security
fromThe Hacker News
4 days ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx's investigation reveals a cybercriminal group published data from its GitHub repository on the dark web following a supply chain attack.
Information security
fromThe Hacker News
1 month ago

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google attributes the Axios npm package compromise to North Korean threat actor UNC1069, highlighting the risks of supply chain attacks.
#checkmarx
#axios
Information security
fromBleepingComputer
3 weeks ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
fromAxios
1 month ago
Node JS

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
fromThe Hacker News
1 month ago
Node JS

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
DevOps
fromAzure DevOps Blog
1 week ago

Axios npm Supply Chain Compromise - Guidance for Azure Pipelines Customers - Azure DevOps Blog

Malicious versions of Axios were published to npm, affecting CI/CD environments that installed them, but Azure Pipelines itself remains uncompromised.
Information security
fromBleepingComputer
3 weeks ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
Node JS
fromSecurityWeek
1 month ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Node JS
fromAxios
1 month ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromThe Hacker News
1 month ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
#bitwarden
Information security
fromSecurityWeek
1 week ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
fromThe Hacker News
1 week ago
Information security

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI was compromised in the Checkmarx supply chain campaign, with malicious code stealing sensitive data from users.
Information security
fromSecurityWeek
1 week ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
#npm
Information security
fromTheregister
1 week ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Node JS
fromInfoQ
1 month ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
1 month ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
1 month ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Information security
fromTheregister
1 week ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Node JS
fromInfoQ
1 month ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
1 month ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
1 month ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
#wordpress
Information security
fromTechRepublic
2 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
Information security
fromTNW | Apps
2 weeks ago

30+ WordPress plugins bought on Flippa and backdoored in supply chain attack

A significant WordPress plugin compromise involved a backdoor planted in over 30 plugins, exposing a critical vulnerability in plugin ownership transfer and update mechanisms.
Information security
fromTechCrunch
2 weeks ago

Someone planted backdoors in dozens of WordPress plugins used in thousands of websites | TechCrunch

Dozens of WordPress plugins were compromised by a backdoor, distributing malicious code after a change in ownership of the plugin maker.
Information security
fromTechRepublic
2 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
Information security
fromTNW | Apps
2 weeks ago

30+ WordPress plugins bought on Flippa and backdoored in supply chain attack

A significant WordPress plugin compromise involved a backdoor planted in over 30 plugins, exposing a critical vulnerability in plugin ownership transfer and update mechanisms.
Information security
fromTechCrunch
2 weeks ago

Someone planted backdoors in dozens of WordPress plugins used in thousands of websites | TechCrunch

Dozens of WordPress plugins were compromised by a backdoor, distributing malicious code after a change in ownership of the plugin maker.
#openai
fromZDNET
4 months ago
Artificial intelligence

OpenAI user data was breached, but changing your password won't help - here's why

fromZDNET
4 months ago
Artificial intelligence

OpenAI user data was breached, but changing your password won't help - here's why

#north-korea
Information security
fromThe Hacker News
3 weeks ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview campaign targets Go, Rust, and PHP ecosystems with malicious packages that function as malware loaders.
Information security
fromSecurityWeek
3 weeks ago

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean hackers are targeting Node.js maintainers using social engineering tactics similar to those used in previous campaigns.
Information security
fromNextgov.com
1 month ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromThe Hacker News
3 weeks ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview campaign targets Go, Rust, and PHP ecosystems with malicious packages that function as malware loaders.
Information security
fromSecurityWeek
3 weeks ago

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean hackers are targeting Node.js maintainers using social engineering tactics similar to those used in previous campaigns.
Information security
fromNextgov.com
1 month ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Node JS
fromSecurityWeek
3 weeks ago

Guardarian Users Targeted With Malicious Strapi NPM Packages

A supply chain attack targeting the Strapi ecosystem involved 36 malicious NPM packages delivering various harmful payloads.
#data-breach
Information security
fromSecuritymagazine
4 weeks ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromSecuritymagazine
4 weeks ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
#litellm
fromInfoQ
1 month ago
Information security

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

Information security
fromInfoQ
1 month ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
fromSecurityWeek
1 month ago

Telnyx Targeted in Growing TeamPCP Supply Chain Attack

The WAV file is a valid audio file. It passes MIME-type checks. But the audio frame data contains a base64-encoded payload. Decode the frames, take the first 8 bytes as the XOR key, XOR the rest, and you have your executable or Python script.
Python
Information security
fromSecurityWeek
1 month ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
#trivy
fromThe Hacker News
1 month ago
Information security

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, an open-source vulnerability scanner, was compromised twice in a month, delivering malware that stole sensitive CI/CD secrets.
Information security
fromThe Hacker News
1 month ago

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, an open-source vulnerability scanner, was compromised twice in a month, delivering malware that stole sensitive CI/CD secrets.
Information security
fromSecurityWeek
1 month ago

ForceMemo: Python Repositories Compromised in GlassWorm Aftermath

Threat actors exploited stolen VS Code credentials to compromise GitHub accounts and inject malware into Python repositories through a technique called ForceMemo that leaves minimal forensic traces.
Information security
fromSecurityWeek
1 month ago

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea

The 2024 Polyfill.io supply chain attack affecting over 100,000 websites involved both Chinese and North Korean threat actors, with Funnull serving as a corporate front for the operation.
Information security
fromThe Hacker News
1 month ago

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 exploited stolen GitHub tokens from the nx npm supply chain compromise to completely breach a victim's cloud environment and exfiltrate data within 72 hours.
Information security
fromThe Hacker News
1 month ago

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Five malicious Rust crates disguised as time utilities steal .env files containing API keys and secrets, exfiltrating data to threat actor infrastructure.
Web frameworks
fromMedium
1 month ago

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

A popular open-source project fell victim to a supply-chain attack through a development workflow loophole, threatening years of work and project reputation.
Information security
fromThe Hacker News
1 month ago

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

A malicious npm package impersonating OpenClaw deploys a remote access trojan and steals sensitive data including credentials, crypto wallets, SSH keys, and browser data from infected systems.
Information security
fromSecurityWeek
1 month ago

Cloned AI Tool Sites Distribute Malware in 'InstallFix' Campaign

InstallFix campaign uses cloned webpages and malvertising to distribute information-stealing malware through fake installation pages for popular development tools.
Web frameworks
fromThe Hacker News
1 month ago

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Malicious Packagist PHP packages disguised as Laravel utilities distribute a cross-platform remote access trojan enabling full system compromise on Windows, macOS, and Linux.
Information security
fromThe Hacker News
2 months ago

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module impersonating legitimate golang.org/x/crypto harvests passwords, establishes SSH persistence, and deploys the Rekoobe Linux backdoor through namespace confusion attacks.
fromBleepingComputer
2 months ago

Fake Next.js job interview tests backdoor developer's devices

The Microsoft Defender team says that the attacker created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments. The researchers initially identified a repository hosted on the Bitbucket cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.
Information security
Information security
fromTheregister
2 months ago

Next.js jobseekers targeted with malicious 'interview' repos

Hackers distribute malicious Next.js repositories that execute in-memory JavaScript on developers' machines through multiple attack vectors during normal development workflows.
fromInfoWorld
2 months ago

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

Multiple repositories followed repeatable naming conventions and project 'family' patterns, enabling targeted searches for additional related repositories that were not directly referenced in observed telemetry but exhibited the same execution and staging behavior.
Information security
fromInfoWorld
2 months ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
#notepad
fromTechCrunch
2 months ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

fromTechCrunch
2 months ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

Information security
fromThe Hacker News
2 months ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
Information security
fromTechRepublic
7 months ago

Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt

Wondershare RepairIt stored user files unencrypted in cloud storage and hardcoded permissive access tokens, enabling attackers to tamper AI models and execute supply chain attacks.
fromSecurityWeek
2 months ago

VS Code Configs Expose GitHub Codespaces to Attacks

It allows developers to test code, review pull requests, and more, but also exposes them to attacks via repository-defined configuration files, Orca says. "Codespaces is essentially VS Code running in the cloud, backed by Ubuntu containers, with built-in GitHub authentication and repository integration. This means any VS Code feature that touches execution, secrets, or extensions can potentially be abused when attackers control the repository content," the cybersecurity firm notes.
Information security
Information security
fromThe Hacker News
2 months ago

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Malicious ClawHub skills use fake prerequisites to deliver trojans and the Atomic Stealer, exposing OpenClaw users to credential theft and supply-chain compromise.
fromThe Hacker News
2 months ago

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

"The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org," developer Don Ho said. "The compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself." The exact mechanism through which this was realized is currently being investigated, Ho added.
Information security
fromThe Hacker News
2 months ago

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm malware loader, These extensions had previously been presented as legitimate developer utilities (some first published more than two years ago) and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases.
Information security
Information security
fromThe Hacker News
3 months ago

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

Two malicious PyPI packages disguised as spellcheckers delivered a Python RAT via a base64 payload hidden in a Basque dictionary file.
Information security
fromThe Hacker News
3 months ago

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A CodeBuild misconfiguration (CodeBreach) allowed unauthenticated attackers to hijack AWS-managed GitHub repositories, risking supply-chain and platform-wide compromise across AWS environments.
Information security
fromThe Hacker News
3 months ago

Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Steady, quiet exploitation of trusted mechanisms—updates, extensions, logins, and messages—drives long-lived attacks like RondoDox and supply-chain compromises.
Information security
fromThe Hacker News
4 months ago

Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack

Supply-chain breach of Trust Wallet's Chrome extension exposed GitHub secrets and a leaked CWS API key, enabling a trojanized update that stole about $8.5M.
Information security
fromArs Technica
4 months ago

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Supply-chain attacks surged in 2024–2025, allowing attackers to compromise single targets and infect thousands or millions of downstream users, causing widespread theft and outages.
#malicious-extensions
fromThe Hacker News
5 months ago

Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the "setup_bun.js" loader and the main payload "bun_environment.js." "This means the PostHog project has compromised releases in both the JavaScript/npm and Java/Maven ecosystems, driven by the same Shai Hulud v2 payload,"
Science
Information security
fromThe Hacker News
5 months ago

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist

A supply-chain attack via a compromised MSP deployed Qilin ransomware against South Korea's financial sector, tied to RaaS affiliates and possible North Korean linkages.
Information security
fromTheregister
5 months ago

Crims plant time bomb malware in industrial .NET extensions

Malicious NuGet packages published in 2023 contained small destructive payloads hidden in benign code, scheduled to trigger between 2027–2028, including attacks on industrial PLCs.
Information security
fromTechzine Global
5 months ago

Invisible malware spread via VS Code extensions

GlassWorm infected Visual Studio Code extensions using invisible Unicode and Solana blockchain command-and-control; OpenVSX was impacted but later contained and remediated.
fromThe Hacker News
5 months ago

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

"Airstalk misuses the AirWatch API for mobile device management (MDM), which is now called Workspace ONE Unified Endpoint Management," security researchers Kristopher Russo and Chema Garcia said in an analysis. "It uses the API to establish a covert command-and-control (C2) channel, primarily through the AirWatch feature to manage custom device attributes and file uploads."
Information security
fromInfoWorld
6 months ago

Serious vulnerability found in Rust library

Researchers at Edera say they have uncovered a critical boundary-parsing bug, dubbed TARmageddon ( CVE-2025-62518), in the popular async-tar Rust library. And not only is it in this library, but also in its many forks, including the widely used tokio-tar. "In the worst-case scenario, this vulnerability has a severity of 8.1 (High) and can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends," the researchers say in a report.
Information security
[ Load more ]