#credential-exfiltration

[ follow ]
Information security
fromTechzine Global
12 hours ago

Microsoft gives guidance on Shai-Hulud 2.0 supply chain attack

Shai-Hulud 2.0 injects preinstall malicious code into npm packages to steal credentials and enable cloud lateral movement, yet detection and defensive controls can block it.
fromThe Hacker News
2 weeks ago

Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the "setup_bun.js" loader and the main payload "bun_environment.js." "This means the PostHog project has compromised releases in both the JavaScript/npm and Java/Maven ecosystems, driven by the same Shai Hulud v2 payload,"
Science
Information security
fromSecurityWeek
3 weeks ago

Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign

A China-linked state-sponsored actor used Anthropic's Claude Code to automate espionage, performing most intrusion tasks with minimal human intervention and compromising several organizations.
Information security
fromThe Hacker News
2 months ago

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

A supply chain attack trojanized over 40 npm packages to install a backdoor that scans developer machines for credentials and exfiltrates secrets.
fromThe Hacker News
3 months ago

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. "On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor," Socket researcher Kirill Boychenko said. The deceptive package, named "golang-random-ip-ssh-bruteforce," has been linked to a GitHub account called IllDieAnyway (G3TT), which is currently no longer accessible.
Information security
[ Load more ]