#supply-chain-attack

[ follow ]
Information security
fromTechzine Global
1 day ago

Checkmarx Jenkins plugin compromised in new supply chain attack

A backdoored Checkmarx Jenkins AST plugin release compromises Jenkins instances, requiring immediate plugin replacement and full secret rotation across multiple credential types.
Information security
fromSecurityWeek
4 days ago

Ransomware Group Takes Credit for Trellix Hack

RansomHouse claimed responsibility for a Trellix breach involving leaked access to internal services and dashboards, while Trellix reported no evidence of source code exploitation.
Information security
fromSecurityWeek
5 days ago

Vendor Says Daemon Tools Supply Chain Attack Contained

Trojanized Daemon Tools Lite installers were injected with malware, leading to information collection and backdoor deployment on selected systems.
Information security
fromSecurityWeek
5 days ago

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking

Attackers can steal OAuth tokens from Claude Code through man-in-the-middle attacks by modifying configuration files and intercepting MCP traffic, gaining access to all connected tools and services.
Information security
fromSecurityWeek
5 days ago

Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain Attack

A critical CVSS 10/10 vulnerability in Gemini CLI's -yolo mode allowed attackers to inject malicious prompts via GitHub issues, potentially enabling full supply chain compromise through credential theft and unauthorized repository access.
#malware
Information security
fromSecurityWeek
6 days ago

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

A sophisticated supply chain attack targets organizations through malicious code in Daemon Tools software, affecting multiple countries and sectors.
Information security
fromInfoWorld
2 weeks ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromThe Hacker News
1 month ago

Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers

Speagle malware hijacks Cobra DocGuard infrastructure to harvest and exfiltrate sensitive data while masking communications as legitimate server traffic.
Information security
fromTechzine Global
1 month ago

GlassWorm malware surfaces in development environments

GlassWorm operation compromised over 400 software components across GitHub, npm, and development marketplaces using supply-chain attacks and blockchain-based command-and-control infrastructure.
#north-korea
Information security
fromInfoWorld
1 week ago

Supply-chain attacks take aim at your AI coding agents

North Korean APTs exploit AI coding agents by creating malicious software packages and using slopsquatting techniques to target hallucinated dependencies.
Information security
fromThe Hacker News
1 week ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Information security
fromThe Hacker News
1 month ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview campaign targets Go, Rust, and PHP ecosystems with malicious packages that function as malware loaders.
Information security
fromSecurityWeek
1 month ago

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean hackers are targeting Node.js maintainers using social engineering tactics similar to those used in previous campaigns.
Information security
fromNextgov.com
1 month ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
Information security
fromInfoWorld
1 week ago

Supply-chain attacks take aim at your AI coding agents

North Korean APTs exploit AI coding agents by creating malicious software packages and using slopsquatting techniques to target hallucinated dependencies.
Information security
fromThe Hacker News
1 week ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Information security
fromThe Hacker News
1 month ago

N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust

Contagious Interview campaign targets Go, Rust, and PHP ecosystems with malicious packages that function as malware loaders.
Information security
fromSecurityWeek
1 month ago

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean hackers are targeting Node.js maintainers using social engineering tactics similar to those used in previous campaigns.
Information security
fromNextgov.com
1 month ago

North Korea-linked hackers suspected in Axios open-source hijack, Google analysts say

North Korea-aligned hackers compromised the Axios JavaScript library, risking many developers' systems through a sophisticated supply chain attack.
#daemon-tools
Information security
fromThe Hacker News
1 week ago

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A supply chain attack on DAEMON Tools has compromised installers to deliver malicious payloads, affecting users globally since April 2026.
Information security
fromTechzine Global
1 week ago

Popular Daemon Tools utility exploited in supply chain attack

Daemon Tools' official website is distributing trojanized installers, enabling a supply chain attack with remote control capabilities since April 8th.
#cybersecurity
fromTechCrunch
1 week ago
Information security

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

Information security
fromThe Hacker News
2 weeks ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx's investigation reveals a cybercriminal group published data from its GitHub repository on the dark web following a supply chain attack.
Information security
fromTechCrunch
1 week ago

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

A backdoor in Daemon Tools has been identified, allowing hackers to target thousands of Windows computers and plant additional malware.
Information security
fromSecurityWeek
1 week ago

Trellix Source Code Repository Breached

Trellix experienced a breach of its source code repository but found no evidence of exploitation or impact on its source code distribution process.
Information security
fromThe Hacker News
1 week ago

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware

A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
Information security
fromArs Technica
1 week ago

Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

Checkmarx and Bitwarden were compromised in a supply chain attack linked to TeamPCP, highlighting vulnerabilities in security tools.
Information security
fromThe Hacker News
2 weeks ago

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx's investigation reveals a cybercriminal group published data from its GitHub repository on the dark web following a supply chain attack.
Information security
fromDeveloper Tech News
1 week ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Information security
fromSecurityWeek
1 week ago

Critical Gemini CLI Flaw Enabled Host Code Execution, Supply Chain Attacks

A critical vulnerability in Gemini CLI allows remote code execution, enabling attackers to exploit CI/CD pipelines for supply chain attacks.
#checkmarx
#axios
Information security
fromBleepingComputer
1 month ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
fromAxios
1 month ago
Node JS

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
fromThe Hacker News
1 month ago
Node JS

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
DevOps
fromAzure DevOps Blog
2 weeks ago

Axios npm Supply Chain Compromise - Guidance for Azure Pipelines Customers - Azure DevOps Blog

Malicious versions of Axios were published to npm, affecting CI/CD environments that installed them, but Azure Pipelines itself remains uncompromised.
Information security
fromBleepingComputer
1 month ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
Node JS
fromSecurityWeek
1 month ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Node JS
fromAxios
1 month ago

North Korean hackers implicated in major supply chain attack

A compromised maintainer account for the Axios npm package led to the publication of malicious software versions targeting various operating systems.
Node JS
fromThe Hacker News
1 month ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
#bitwarden
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
fromThe Hacker News
2 weeks ago
Information security

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

Bitwarden CLI was compromised in the Checkmarx supply chain campaign, with malicious code stealing sensitive data from users.
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
#npm
Information security
fromTheregister
2 weeks ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Node JS
fromInfoQ
1 month ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
1 month ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
1 month ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Information security
fromTheregister
2 weeks ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Node JS
fromInfoQ
1 month ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
1 month ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
1 month ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
#wordpress
Information security
fromTechRepublic
3 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
Information security
fromTNW | Apps
3 weeks ago

30+ WordPress plugins bought on Flippa and backdoored in supply chain attack

A significant WordPress plugin compromise involved a backdoor planted in over 30 plugins, exposing a critical vulnerability in plugin ownership transfer and update mechanisms.
Information security
fromTechCrunch
4 weeks ago

Someone planted backdoors in dozens of WordPress plugins used in thousands of websites | TechCrunch

Dozens of WordPress plugins were compromised by a backdoor, distributing malicious code after a change in ownership of the plugin maker.
Information security
fromTechRepublic
3 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
Information security
fromTNW | Apps
3 weeks ago

30+ WordPress plugins bought on Flippa and backdoored in supply chain attack

A significant WordPress plugin compromise involved a backdoor planted in over 30 plugins, exposing a critical vulnerability in plugin ownership transfer and update mechanisms.
Information security
fromTechCrunch
4 weeks ago

Someone planted backdoors in dozens of WordPress plugins used in thousands of websites | TechCrunch

Dozens of WordPress plugins were compromised by a backdoor, distributing malicious code after a change in ownership of the plugin maker.
#openai
fromZDNET
5 months ago
Artificial intelligence

OpenAI user data was breached, but changing your password won't help - here's why

fromZDNET
5 months ago
Artificial intelligence

OpenAI user data was breached, but changing your password won't help - here's why

Node JS
fromSecurityWeek
1 month ago

Guardarian Users Targeted With Malicious Strapi NPM Packages

A supply chain attack targeting the Strapi ecosystem involved 36 malicious NPM packages delivering various harmful payloads.
#data-breach
Information security
fromSecuritymagazine
1 month ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Information security
fromSecuritymagazine
1 month ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
#litellm
Information security
fromInfoQ
1 month ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
Information security
fromInfoQ
1 month ago

PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information

A supply chain attack on LiteLLM led to over 40,000 downloads of a compromised package that harvested sensitive information.
fromSecurityWeek
1 month ago

Telnyx Targeted in Growing TeamPCP Supply Chain Attack

The WAV file is a valid audio file. It passes MIME-type checks. But the audio frame data contains a base64-encoded payload. Decode the frames, take the first 8 bytes as the XOR key, XOR the rest, and you have your executable or Python script.
Python
Information security
fromSecurityWeek
1 month ago

From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI

TeamPCP hacking group expanded its attacks to multiple platforms, exploiting vulnerabilities and compromising credentials for malicious purposes.
#trivy
fromThe Hacker News
1 month ago
Information security

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, an open-source vulnerability scanner, was compromised twice in a month, delivering malware that stole sensitive CI/CD secrets.
Information security
fromThe Hacker News
1 month ago

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Trivy, an open-source vulnerability scanner, was compromised twice in a month, delivering malware that stole sensitive CI/CD secrets.
Information security
fromSecurityWeek
1 month ago

ForceMemo: Python Repositories Compromised in GlassWorm Aftermath

Threat actors exploited stolen VS Code credentials to compromise GitHub accounts and inject malware into Python repositories through a technique called ForceMemo that leaves minimal forensic traces.
Information security
fromSecurityWeek
2 months ago

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea

The 2024 Polyfill.io supply chain attack affecting over 100,000 websites involved both Chinese and North Korean threat actors, with Funnull serving as a corporate front for the operation.
Information security
fromThe Hacker News
2 months ago

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 exploited stolen GitHub tokens from the nx npm supply chain compromise to completely breach a victim's cloud environment and exfiltrate data within 72 hours.
Information security
fromThe Hacker News
2 months ago

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Five malicious Rust crates disguised as time utilities steal .env files containing API keys and secrets, exfiltrating data to threat actor infrastructure.
Web frameworks
fromMedium
2 months ago

My 8-Year-Old Open-Source Project was a Victim of a Major Cyber Attack

A popular open-source project fell victim to a supply-chain attack through a development workflow loophole, threatening years of work and project reputation.
Information security
fromThe Hacker News
2 months ago

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

A malicious npm package impersonating OpenClaw deploys a remote access trojan and steals sensitive data including credentials, crypto wallets, SSH keys, and browser data from infected systems.
Information security
fromSecurityWeek
2 months ago

Cloned AI Tool Sites Distribute Malware in 'InstallFix' Campaign

InstallFix campaign uses cloned webpages and malvertising to distribute information-stealing malware through fake installation pages for popular development tools.
Web frameworks
fromThe Hacker News
2 months ago

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Malicious Packagist PHP packages disguised as Laravel utilities distribute a cross-platform remote access trojan enabling full system compromise on Windows, macOS, and Linux.
Information security
fromThe Hacker News
2 months ago

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module impersonating legitimate golang.org/x/crypto harvests passwords, establishes SSH persistence, and deploys the Rekoobe Linux backdoor through namespace confusion attacks.
fromBleepingComputer
2 months ago

Fake Next.js job interview tests backdoor developer's devices

The Microsoft Defender team says that the attacker created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments. The researchers initially identified a repository hosted on the Bitbucket cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.
Information security
Information security
fromTheregister
2 months ago

Next.js jobseekers targeted with malicious 'interview' repos

Hackers distribute malicious Next.js repositories that execute in-memory JavaScript on developers' machines through multiple attack vectors during normal development workflows.
fromInfoWorld
2 months ago

Microsoft warns of jobthemed repo lures targeting developers with multistage backdoors

Multiple repositories followed repeatable naming conventions and project 'family' patterns, enabling targeted searches for additional related repositories that were not directly referenced in observed telemetry but exhibited the same execution and staging behavior.
Information security
fromInfoWorld
2 months ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
#notepad
fromTechCrunch
3 months ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

fromTechCrunch
3 months ago
Information security

Notepad++ says Chinese government hackers hijacked its software updates for months | TechCrunch

Information security
fromThe Hacker News
2 months ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
Information security
fromTechRepublic
7 months ago

Security Breaches Found in AI-Powered Repair Tool Wondershare RepairIt

Wondershare RepairIt stored user files unencrypted in cloud storage and hardcoded permissive access tokens, enabling attackers to tamper AI models and execute supply chain attacks.
fromSecurityWeek
3 months ago

VS Code Configs Expose GitHub Codespaces to Attacks

It allows developers to test code, review pull requests, and more, but also exposes them to attacks via repository-defined configuration files, Orca says. "Codespaces is essentially VS Code running in the cloud, backed by Ubuntu containers, with built-in GitHub authentication and repository integration. This means any VS Code feature that touches execution, secrets, or extensions can potentially be abused when attackers control the repository content," the cybersecurity firm notes.
Information security
Information security
fromThe Hacker News
3 months ago

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Malicious ClawHub skills use fake prerequisites to deliver trojans and the Atomic Stealer, exposing OpenClaw users to credential theft and supply-chain compromise.
fromThe Hacker News
3 months ago

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

"The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org," developer Don Ho said. "The compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself." The exact mechanism through which this was realized is currently being investigated, Ho added.
Information security
fromThe Hacker News
3 months ago

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm malware loader, These extensions had previously been presented as legitimate developer utilities (some first published more than two years ago) and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases.
Information security
Information security
fromThe Hacker News
3 months ago

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

Two malicious PyPI packages disguised as spellcheckers delivered a Python RAT via a base64 payload hidden in a Basque dictionary file.
Information security
fromThe Hacker News
3 months ago

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

A CodeBuild misconfiguration (CodeBreach) allowed unauthenticated attackers to hijack AWS-managed GitHub repositories, risking supply-chain and platform-wide compromise across AWS environments.
Information security
fromThe Hacker News
4 months ago

Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Steady, quiet exploitation of trusted mechanisms—updates, extensions, logins, and messages—drives long-lived attacks like RondoDox and supply-chain compromises.
Information security
fromThe Hacker News
4 months ago

Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack

Supply-chain breach of Trust Wallet's Chrome extension exposed GitHub secrets and a leaked CWS API key, enabling a trojanized update that stole about $8.5M.
Information security
fromArs Technica
4 months ago

Supply chains, AI, and the cloud: The biggest failures (and one success) of 2025

Supply-chain attacks surged in 2024–2025, allowing attackers to compromise single targets and infect thousands or millions of downstream users, causing widespread theft and outages.
#malicious-extensions
[ Load more ]