#supply-chain attack

[ follow ]
fromSecurityWeek
22 hours ago

VS Code Configs Expose GitHub Codespaces to Attacks

It allows developers to test code, review pull requests, and more, but also exposes them to attacks via repository-defined configuration files, Orca says. "Codespaces is essentially VS Code running in the cloud, backed by Ubuntu containers, with built-in GitHub authentication and repository integration. This means any VS Code feature that touches execution, secrets, or extensions can potentially be abused when attackers control the repository content," the cybersecurity firm notes.
Information security
#supply-chain-attack
Information security
fromThe Hacker News
1 month ago

Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Steady, quiet exploitation of trusted mechanisms—updates, extensions, logins, and messages—drives long-lived attacks like RondoDox and supply-chain compromises.
Information security
fromThe Hacker News
1 month ago

Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack

Supply-chain breach of Trust Wallet's Chrome extension exposed GitHub secrets and a leaked CWS API key, enabling a trojanized update that stole about $8.5M.
#notepad
fromTechCrunch
3 days ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

fromTechCrunch
3 days ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

Information security
fromThe Hacker News
1 week ago

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

Two malicious PyPI packages disguised as spellcheckers delivered a Python RAT via a base64 payload hidden in a Basque dictionary file.
#malware
Information security
fromThe Hacker News
3 weeks ago

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A CodeBuild misconfiguration (CodeBreach) allowed unauthenticated attackers to hijack AWS-managed GitHub repositories, risking supply-chain and platform-wide compromise across AWS environments.
#data-breach
fromIT Pro
6 months ago
Privacy technologies

Air France and KLM confirm customer data stolen in third-party breach

fromIT Pro
6 months ago
Privacy technologies

Air France and KLM confirm customer data stolen in third-party breach

#npm
fromInfoQ
3 months ago
Information security

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks

fromInfoQ
3 months ago
Information security

NPM Ecosystem Suffers Two AI-Enabled Credential Stealing Supply Chain Attacks

fromThe Hacker News
2 months ago

Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the "setup_bun.js" loader and the main payload "bun_environment.js." "This means the PostHog project has compromised releases in both the JavaScript/npm and Java/Maven ecosystems, driven by the same Shai Hulud v2 payload,"
Science
Information security
fromThe Hacker News
2 months ago

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist

A supply-chain attack via a compromised MSP deployed Qilin ransomware against South Korea's financial sector, tied to RaaS affiliates and possible North Korean linkages.
Information security
fromTheregister
2 months ago

Crims plant time bomb malware in industrial .NET extensions

Malicious NuGet packages published in 2023 contained small destructive payloads hidden in benign code, scheduled to trigger between 2027–2028, including attacks on industrial PLCs.
Information security
fromTechzine Global
3 months ago

Invisible malware spread via VS Code extensions

GlassWorm infected Visual Studio Code extensions using invisible Unicode and Solana blockchain command-and-control; OpenVSX was impacted but later contained and remediated.
fromThe Hacker News
3 months ago

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

"Airstalk misuses the AirWatch API for mobile device management (MDM), which is now called Workspace ONE Unified Endpoint Management," security researchers Kristopher Russo and Chema Garcia said in an analysis. "It uses the API to establish a covert command-and-control (C2) channel, primarily through the AirWatch feature to manage custom device attributes and file uploads."
Information security
fromInfoWorld
3 months ago

Serious vulnerability found in Rust library

Researchers at Edera say they have uncovered a critical boundary-parsing bug, dubbed TARmageddon ( CVE-2025-62518), in the popular async-tar Rust library. And not only is it in this library, but also in its many forks, including the widely used tokio-tar. "In the worst-case scenario, this vulnerability has a severity of 8.1 (High) and can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends," the researchers say in a report.
Information security
#f5-breach
fromWIRED
3 months ago
Information security

Why the F5 Hack Created an 'Imminent Threat' for Thousands of Networks

fromWIRED
3 months ago
Information security

Why the F5 Hack Created an 'Imminent Threat' for Thousands of Networks

Information security
fromIT Pro
4 months ago

A malicious MCP server is silently stealing user emails

A malicious MCP server repackaged as Postmark on npm exfiltrated thousands of emails by adding a BCC line, exploiting full assistant privileges and bypassing security controls.
#phishing
Information security
fromThe Hacker News
4 months ago

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Two critical authentication-bypass vulnerabilities in Wondershare RepairIt exposed unencrypted user data and cloud resources, enabling AI model tampering, supply-chain attacks, and remote code execution.
Information security
fromTheregister
4 months ago

SolarWinds patches critical RCE - for the third time

SolarWinds issued a third hotfix for a critical (9.8) unauthenticated deserialization RCE in Web Help Desk, which remains patch-bypassed and likely exploitable.
Information security
fromBitcoin Magazine
4 months ago

NPM Attack: Javascript Library Compromise Goes After Bitcoin Wallets

Compromised NPM account pushed malware that locates cryptocurrency wallets, modifies transaction-signing functions, and swaps recipient addresses to steal funds.
Information security
fromTechCrunch
4 months ago

Salesloft says Drift customer data thefts linked to March GitHub account hack | TechCrunch

A March GitHub breach at Salesloft allowed theft of authentication and OAuth tokens, enabling mass hacks of multiple large tech customers and a supply-chain compromise.
Information security
fromThe Hacker News
5 months ago

Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys

Four npm packages impersonating Flashbots exfiltrate Ethereum private keys and mnemonic seeds to a Telegram bot and redirect unsigned transactions to attacker-controlled wallets.
fromTechzine Global
5 months ago

Hackers steal customer data from Zscaler via Salesloft leak

Following a previous series of victims, Zscaler has also been affected by a hacked Salesforce Drift instance. This resulted in the theft of customer data and information about support cases. Zscaler warns that hackers stole sensitive customer data after gaining access to their Salesforce environment. The stolen data includes customer names, email addresses, job titles, phone numbers, and location data. In addition, product licenses, commercial information, and the content of certain support cases have also been compromised.
Information security
#cybersecurity
Cryptocurrency
fromThe Hacker News
9 months ago

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

Three malicious Go modules can destroy Linux systems by overwriting primary disks, indicating significant supply-chain attack risks.
Information security
fromThe Hacker News
8 months ago

DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

DragonForce ransomware exploited vulnerabilities in a Managed Service Provider's SimpleHelp tool for data exfiltration and ransomware deployment.
fromArs Technica
9 months ago

Hundreds of e-commerce sites hacked in supply-chain attack

The widespread supply chain attack targeted at least 500 e-commerce sites, compromising sensitive customer data by executing malicious code via visited browsers.
E-Commerce
Node JS
fromThe Hacker News
9 months ago

Ripple's xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack

XRPL.js, a popular JavaScript library, was compromised in a supply chain attack aimed at harvesting users' private keys.
DevOps
fromInfoQ
9 months ago

Compromised GitHub Action Highlights Risks in CI/CD Supply Chains

A popular GitHub Action was compromised, exposing critical security weaknesses in the CI/CD pipeline of open-source Actions.
[ Load more ]