#supply-chain attack

[ follow ]
#supply-chain-attack
Information security
fromTechzine Global
2 days ago

Checkmarx Jenkins plugin compromised in new supply chain attack

A backdoored Checkmarx Jenkins AST plugin release compromises Jenkins instances, requiring immediate plugin replacement and full secret rotation across multiple credential types.
Information security
fromSecurityWeek
6 days ago

Vendor Says Daemon Tools Supply Chain Attack Contained

Trojanized Daemon Tools Lite installers were injected with malware, leading to information collection and backdoor deployment on selected systems.
Information security
fromSecurityWeek
6 days ago

Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack

A critical CVSS 10/10 vulnerability in Gemini CLI's -yolo mode allowed attackers to inject malicious prompts via GitHub issues, potentially enabling full supply chain compromise through credential theft and unauthorized repository access.
Information security
fromSecurityWeek
1 week ago

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

A sophisticated supply chain attack targets organizations through malicious code in Daemon Tools software, affecting multiple countries and sectors.
Information security
fromThe Hacker News
1 week ago

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A supply chain attack on DAEMON Tools has compromised installers to deliver malicious payloads, affecting users globally since April 2026.
Information security
fromSecurityWeek
5 days ago

Ransomware Group Takes Credit for Trellix Hack

RansomHouse claimed responsibility for a Trellix breach involving leaked access to internal services and dashboards, while Trellix reported no evidence of source code exploitation.
Information security
fromSecurityWeek
6 days ago

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking

Attackers can steal OAuth tokens from Claude Code through man-in-the-middle attacks by modifying configuration files and intercepting MCP traffic, gaining access to all connected tools and services.
#north-korea
Information security
fromInfoWorld
1 week ago

Supply-chain attacks take aim at your AI coding agents

North Korean APTs exploit AI coding agents by creating malicious software packages and using slopsquatting techniques to target hallucinated dependencies.
Information security
fromThe Hacker News
1 week ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Information security
fromThe Hacker News
1 month ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview campaign targets Go, Rust, and PHP ecosystems with malicious packages that function as malware loaders.
Information security
fromSecurityWeek
1 month ago

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean hackers are targeting Node.js maintainers using social engineering tactics similar to those used in previous campaigns.
Information security
fromNextgov.com
1 month ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromInfoWorld
1 week ago

Supply-chain attacks take aim at your AI coding agents

North Korean APTs exploit AI coding agents by creating malicious software packages and using slopsquatting techniques to target hallucinated dependencies.
Information security
fromThe Hacker News
1 week ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Information security
fromThe Hacker News
1 month ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview campaign targets Go, Rust, and PHP ecosystems with malicious packages that function as malware loaders.
Information security
fromSecurityWeek
1 month ago

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean hackers are targeting Node.js maintainers using social engineering tactics similar to those used in previous campaigns.
Information security
fromNextgov.com
1 month ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
#cybersecurity
fromTechCrunch
1 week ago
Information security

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

Information security
fromThe Hacker News
1 month ago

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google attributes the Axios npm package compromise to North Korean threat actor UNC1069, highlighting the risks of supply chain attacks.
Information security
fromTechCrunch
1 week ago

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

A backdoor in Daemon Tools has been identified, allowing hackers to target thousands of Windows computers and plant additional malware.
Information security
fromSecurityWeek
1 week ago

Trellix Source Code Repository Breached

Trellix experienced a breach of its source code repository but found no evidence of exploitation or impact on its source code distribution process.
Information security
fromThe Hacker News
2 weeks ago

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware

A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
Information security
fromThe Hacker News
2 weeks ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx's investigation reveals a cybercriminal group published data from its GitHub repository on the dark web following a supply chain attack.
Information security
fromThe Hacker News
1 month ago

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google attributes the Axios npm package compromise to North Korean threat actor UNC1069, highlighting the risks of supply chain attacks.
Information security
fromTechzine Global
1 week ago

Popular Daemon Tools utility exploited in supply chain attack

Daemon Tools' official website is distributing trojanized installers, enabling a supply chain attack with remote control capabilities since April 8th.
Information security
fromDeveloper Tech News
1 week ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Information security
fromSecurityWeek
1 week ago

Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

A critical vulnerability in Gemini CLI allows remote code execution, enabling attackers to exploit CI/CD pipelines for supply chain attacks.
#checkmarx
#axios
Information security
fromBleepingComputer
1 month ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
fromAxios
1 month ago
Node JS

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
fromThe Hacker News
1 month ago
Node JS

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
DevOps
fromAzure DevOps Blog
2 weeks ago

Axios npm Supply Chain Compromise - Guidance for Azure Pipelines Customers - Azure DevOps Blog

Malicious versions of Axios were published to npm, affecting CI/CD environments that installed them, but Azure Pipelines itself remains uncompromised.
Information security
fromBleepingComputer
1 month ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
Node JS
fromSecurityWeek
1 month ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Node JS
fromAxios
1 month ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromThe Hacker News
1 month ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
#bitwarden
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
fromThe Hacker News
2 weeks ago
Information security

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI was compromised in the Checkmarx supply chain campaign, with malicious code stealing sensitive data from users.
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
#malware
Information security
fromInfoWorld
2 weeks ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromThe Hacker News
1 month ago

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Speagle malware hijacks Cobra DocGuard infrastructure to harvest and exfiltrate sensitive data while masking communications as legitimate server traffic.
Information security
fromInfoWorld
2 weeks ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromThe Hacker News
1 month ago

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Speagle malware hijacks Cobra DocGuard infrastructure to harvest and exfiltrate sensitive data while masking communications as legitimate server traffic.
#npm
Information security
fromTheregister
2 weeks ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Node JS
fromInfoQ
1 month ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
1 month ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
1 month ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Information security
fromTheregister
2 weeks ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Node JS
fromInfoQ
1 month ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
1 month ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
1 month ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
#wordpress
Information security
fromTechRepublic
3 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
Information security
fromTNW | Apps
4 weeks ago

30+ WordPress plugins bought on Flippa and backdoored in supply chain attack

A significant WordPress plugin compromise involved a backdoor planted in over 30 plugins, exposing a critical vulnerability in plugin ownership transfer and update mechanisms.
Information security
fromTechCrunch
4 weeks ago

Someone planted backdoors in dozens of WordPress plugins used in thousands of websites | TechCrunch

Dozens of WordPress plugins were compromised by a backdoor, distributing malicious code after a change in ownership of the plugin maker.
Information security
fromTechRepublic
3 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
Information security
fromTNW | Apps
4 weeks ago

30+ WordPress plugins bought on Flippa and backdoored in supply chain attack

A significant WordPress plugin compromise involved a backdoor planted in over 30 plugins, exposing a critical vulnerability in plugin ownership transfer and update mechanisms.
Information security
fromTechCrunch
4 weeks ago

Someone planted backdoors in dozens of WordPress plugins used in thousands of websites | TechCrunch

Dozens of WordPress plugins were compromised by a backdoor, distributing malicious code after a change in ownership of the plugin maker.
#openai
Node JS
fromSecurityWeek
1 month ago

Guardarian Users Targeted With Malicious Strapi NPM Packages

A supply chain attack targeting the Strapi ecosystem involved 36 malicious NPM packages delivering various harmful payloads.
#data-breach
Information security
fromSecuritymagazine
1 month ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromSecuritymagazine
1 month ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
fromSecurityWeek
1 month ago

Telnyx Targeted in Growing TeamPCP Supply Chain Attack

The WAV file is a valid audio file. It passes MIME-type checks. But the audio frame data contains a base64-encoded payload. Decode the frames, take the first 8 bytes as the XOR key, XOR the rest, and you have your executable or Python script.
Python
Information security
fromSecurityWeek
1 month ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
#trivy
Information security
fromThe Hacker News
1 month ago

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, an open-source vulnerability scanner, was compromised twice in a month, delivering malware that stole sensitive CI/CD secrets.
Information security
fromThe Hacker News
2 months ago

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

A malicious npm package impersonating OpenClaw deploys a remote access trojan and steals sensitive data including credentials, crypto wallets, SSH keys, and browser data from infected systems.
Information security
fromSecurityWeek
2 months ago

Cloned AI Tool Sites Distribute Malware in 'InstallFix' Campaign

InstallFix campaign uses cloned webpages and malvertising to distribute information-stealing malware through fake installation pages for popular development tools.
fromBleepingComputer
2 months ago

Fake Next.js job interview tests backdoor developer's devices

The Microsoft Defender team says that the attacker created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments. The researchers initially identified a repository hosted on the Bitbucket cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.
Information security
Information security
fromTheregister
2 months ago

Next.js jobseekers targeted with malicious 'interview' repos

Hackers distribute malicious Next.js repositories that execute in-memory JavaScript on developers' machines through multiple attack vectors during normal development workflows.
fromInfoWorld
2 months ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
#notepad
fromTechCrunch
3 months ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

fromTechCrunch
3 months ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

Information security
fromThe Hacker News
2 months ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
fromSecurityWeek
3 months ago

VS Code Configs Expose GitHub Codespaces to Attacks

It allows developers to test code, review pull requests, and more, but also exposes them to attacks via repository-defined configuration files, Orca says. "Codespaces is essentially VS Code running in the cloud, backed by Ubuntu containers, with built-in GitHub authentication and repository integration. This means any VS Code feature that touches execution, secrets, or extensions can potentially be abused when attackers control the repository content," the cybersecurity firm notes.
Information security
Information security
fromThe Hacker News
3 months ago

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

Two malicious PyPI packages disguised as spellcheckers delivered a Python RAT via a base64 payload hidden in a Basque dictionary file.
Information security
fromThe Hacker News
3 months ago

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A CodeBuild misconfiguration (CodeBreach) allowed unauthenticated attackers to hijack AWS-managed GitHub repositories, risking supply-chain and platform-wide compromise across AWS environments.
[ Load more ]