OpenAI caught in TanStack npm supply chain chaos after employee devices compromised
Briefly

OpenAI caught in TanStack npm supply chain chaos after employee devices compromised
"OpenAI says attackers behind the TanStack npm supply chain compromise stole internal credentials after reaching two employee devices, forcing the company to rotate signing certificates for several desktop products. The company disclosed this week that it had been caught up in the wider "Mini Shai-Hulud" campaign targeting npm ecosystems and developer infrastructure, though it said there was no evidence that customer data, production systems, or deployed software were compromised."
"OpenAI said the incident happened during a phased rollout of new supply chain security controls introduced after a previous Axios-related incident. According to the company, the two compromised employee devices had not yet received updated package management protections that would have blocked the malicious dependency. The attackers carried out "credential-focused exfiltration activity" against a limited set of internal repositories reachable from the affected employee machines, according to OpenAI."
"It said "only limited credential material was successfully exfiltrated from these code repositories." That was apparently enough to trigger a precautionary reset across multiple products. OpenAI is rotating the certificates used to sign macOS versions of ChatGPT Desktop, Codex App, Codex CLI, and Atlas, and is requiring users to update the affected software by June 12."
"The incident ties OpenAI to the increasingly messy supply chain campaign that has spent the past several weeks worming through npm ecosystems, CI/CD infrastructure, and GitHub Actions workflows. Security firm Socket linked the TanStack compromise to the broader "Mini Shai-Hulud" operation, which abused poisoned automation workflows and stolen publishing credentials to push malicious package updates into trusted software pipelines."
Attackers reached two employee machines with malware delivered through poisoned packages in the npm ecosystem. OpenAI reported that the affected devices had not yet received updated package management protections that could have blocked the malicious dependency. The attackers performed credential-focused exfiltration against a limited set of internal repositories accessible from those machines. Only limited credential material was successfully exfiltrated. OpenAI stated there was no evidence of customer data, production systems, or deployed software being compromised. As a precaution, OpenAI rotated signing certificates for multiple desktop products and required users to update by June 12. The incident is connected to a broader campaign targeting npm and developer infrastructure, including CI/CD and GitHub Actions workflows.
Read at theregister
Unable to calculate read time
[
|
]