🚨The npm ecosystem just suffered one of the most serious supply-chain attacks to date. What happened: Attackers hijacked a trusted maintainer’s account and injected malware into widely used npm packages. Impact: These packages see 2.6 billion weekly downloads. The payload executed in users’ browsers, silently rewriting payment destinations and approvals to attacker-controlled accounts, all while keeping the interface looking normal. How to mitigate: Update dependencies: upgrade to safe versions and pin where possible Rebuild clean: clear caches and pull only from trusted sources Audit behavior: look for suspicious install scripts, network activity, or obfuscated code Monitor runtime: detect if malicious code actually executes in your environment Why this matters: Traditional scanning tools flag files, but they can’t always tell you what’s truly dangerous. At Sweet, we focus on what actually runs at runtime, so you can cut through the noise, see what’s really at risk, and respond before damage is done. Read more here: https://hubs.li/Q03Hpvql0 #SupplyChainAttack #SweetSecurity #cloudsecurity #RuntimeCNAPP #phishing
npm supply-chain attack: how to mitigate and why it matters
More Relevant Posts
-
Sharing in case you missed it: our CTO Tomer Filiba wrote a great breakdown on a new kind of supply chain attack that recently hit the npm ecosystem. If you haven’t had the chance to read it yet, now’s a great time to catch up 👇
🚨The npm ecosystem just suffered one of the most serious supply-chain attacks to date. What happened: Attackers hijacked a trusted maintainer’s account and injected malware into widely used npm packages. Impact: These packages see 2.6 billion weekly downloads. The payload executed in users’ browsers, silently rewriting payment destinations and approvals to attacker-controlled accounts, all while keeping the interface looking normal. How to mitigate: Update dependencies: upgrade to safe versions and pin where possible Rebuild clean: clear caches and pull only from trusted sources Audit behavior: look for suspicious install scripts, network activity, or obfuscated code Monitor runtime: detect if malicious code actually executes in your environment Why this matters: Traditional scanning tools flag files, but they can’t always tell you what’s truly dangerous. At Sweet, we focus on what actually runs at runtime, so you can cut through the noise, see what’s really at risk, and respond before damage is done. Read more here: https://hubs.li/Q03Hpvql0 #SupplyChainAttack #SweetSecurity #cloudsecurity #RuntimeCNAPP #phishing
To view or add a comment, sign in
-
-
#trybeforeyoubuy Browser extensions can quietly shift policies, collect sensitive data, or even turn malicious overnight. Traditional security stacks rarely catch it. That’s where BrowserTotal.com comes in. Think of it as VirusTotal for browser extensions: ✅ Instant extension risk scoring ✅ Continuous monitoring for permission & policy changes ✅ Actionable insights for CISOs, analysts, and security teams If your EDR, SIEM, or SASE tools aren’t giving you visibility here, BrowserTotal closes the gap. 👉 Try it out and see what’s really hiding inside your browser then come see a demo of Seraphic Security to gain actual protection.
SecOps Friends, If you've been hit with ClickFix or ClearFake, Check out our free service https://lnkd.in/gwtxwwg7 & https://lnkd.in/guDD8J85 for a harmless demo of the attacks. You can even run a detailed analysis of any extension. We'll detonate it in a sandbox & highlight all the vulnerabilities in the code. Then you can decide if you want to deny or allow it! https://lnkd.in/gCA857ss
To view or add a comment, sign in
-
WHEN UPDATES BACKFIRE (DESPITE GOOD INTENTIONS): Researchers traced the exploit to a "race condition" triggered by rapid HTTP(S) requests, where barely timed headers let hackers impersonate the “crushadmin” user. The exploit went live shortly after a code update intended to fix an unrelated AS2 bug, unintentionally revealing the flaw to attackers. Over 30,000 installations were at risk; and as of late July, about 1,000 remained unpatched—even though fixes were available. This basically turned a housekeeping update into a zero-day weapon. And it highlights a vital lesson: even minor code changes can create major security gaps, and patching must be relentless. https://lnkd.in/ek_SWkkW #auguryit #zerodays #patching #security
To view or add a comment, sign in
-
XSS (Cross-Site Scripting) is a serious web vulnerability that lets attackers inject malicious scripts into websites. As a tangible example, it was the technique used in the 2018 British Airways breach, where hackers stole credit card details from 380,000+ customers. My friend John Kounelis put together an excellent video that breaks down the different types of XSS with real-world examples, showing how this threat could be exploited in bug bounty scenarios. If you’re into security or development, this one is worth a watch: https://lnkd.in/gTuF3SvG
Bug Bounty Tip: DOM XSS And Client Side Hacking
https://www.youtube.com/
To view or add a comment, sign in
-
🚨 Supply Chain Attack Hijacks ctrl/tinycolor With 2M+ Downloads and Other 40 NPM Packages | Read more: https://lnkd.in/gSaAEXGx A sophisticated and widespread supply chain attack has struck the NPM ecosystem, compromising the popular ctrl/tinycolor package, which is downloaded over 2 million times per week. The attack also affected more than 40 other packages from various maintainers, introducing a dangerous self-propagating malware designed to steal developer credentials and spread itself across the software landscape. The malicious versions, identified as 4.1.1 and 4.1.2 of @ctrl/tinycolor, were quickly removed from the NPM registry, but not before they were distributed. #cybersecuritynews
To view or add a comment, sign in
-
-
🚨 Massive Supply Chain Attack Hits NPM Ecosystem 🚨 A sophisticated supply chain attack has compromised the popular @ctrl/tinycolor package, downloaded over 2M+ times per week, along with more than 40 other NPM packages. The attack introduced self-propagating malware capable of stealing developer credentials and spreading across the software landscape. Malicious versions (4.1.1 & 4.1.2) were quickly removed from the NPM registry, but not before being distributed. 🔐 This incident once again highlights the fragility of supply chains in modern software development. With open-source dependencies forming the backbone of countless applications, one compromised package can ripple across industries, exposing critical systems to exploitation. 👉 Key Takeaways: • Always verify the integrity of dependencies. • Monitor for suspicious updates or unusual package activity. • Adopt SBOMs (Software Bill of Materials) and stronger supply chain security practices. 🛡️ Supply chain security is no longer optional—it’s a necessity. What measures are you and your team implementing to secure your software supply chain? #CyberSecurity #SupplyChainAttack #NPM #OpenSourceSecurity #DevSecOps
🚨 Supply Chain Attack Hijacks ctrl/tinycolor With 2M+ Downloads and Other 40 NPM Packages | Read more: https://lnkd.in/gSaAEXGx A sophisticated and widespread supply chain attack has struck the NPM ecosystem, compromising the popular ctrl/tinycolor package, which is downloaded over 2 million times per week. The attack also affected more than 40 other packages from various maintainers, introducing a dangerous self-propagating malware designed to steal developer credentials and spread itself across the software landscape. The malicious versions, identified as 4.1.1 and 4.1.2 of @ctrl/tinycolor, were quickly removed from the NPM registry, but not before they were distributed. #cybersecuritynews
To view or add a comment, sign in
-
-
The popular @ctrl/tinycolor package with over 2 million weekly downloads has been compromised alongside 40+ other NPM packages in a sophisticated supply chain attack. https://lnkd.in/eeAKcTTj To check if you have any affected packages: npm ls @ctrl/tinycolor https://lnkd.in/erNrdJSQ
🚨 Supply Chain Attack Hijacks ctrl/tinycolor With 2M+ Downloads and Other 40 NPM Packages | Read more: https://lnkd.in/gSaAEXGx A sophisticated and widespread supply chain attack has struck the NPM ecosystem, compromising the popular ctrl/tinycolor package, which is downloaded over 2 million times per week. The attack also affected more than 40 other packages from various maintainers, introducing a dangerous self-propagating malware designed to steal developer credentials and spread itself across the software landscape. The malicious versions, identified as 4.1.1 and 4.1.2 of @ctrl/tinycolor, were quickly removed from the NPM registry, but not before they were distributed. #cybersecuritynews
To view or add a comment, sign in
-
-
🚨 For all my Apache DolphinScheduler users and security peers, keep an eye on CVE-2024-43115. This one is an Improper Input Validation vulnerability that lets an authenticated user execute arbitrary shell scripts on the server via alert scripts. 📌 Affected versions: before 3.2.2 📌 Fixed in: 3.3.1 If you’re running DolphinScheduler, I strongly recommend patching as soon as possible. While it requires authentication, the impact is significant, it could allow malicious insiders or compromised accounts to execute arbitrary commands and compromise the system. As a penetration tester, I see firsthand how often “small” validation issues lead to big compromises. Staying ahead with patch management is critical. Stay safe and updated. https://lnkd.in/du__st5z #CyberSecurity #CVE #Apache #VulnerabilityManagement #PenTest
To view or add a comment, sign in
-
🚨 A new critical vulnerability in Wing FTP Server (CVE-2025-47812) is being actively exploited by attackers. This flaw allows remote code execution, giving hackers the ability to run malicious Lua scripts, create backdoor accounts, and steal data. 👉 The takeaway? Once attackers get execution rights, it’s already too late. Detect-and-respond strategies leave businesses scrambling after the damage begins. In our latest blog, we break down what happened, why this vulnerability is so dangerous, and why the security community needs to push harder toward isolation and containment strategies that stop attacks before they execute. 🔒 Staying informed is the first step. Protecting against these evolving threats requires rethinking the way we approach endpoint security. Read the full blog here 👇 https://buff.ly/0vrIQdL #cybersecurity #ransomware #endpointsecurity #dataprotection #zeroday #securityawareness #AppGuard #AppGuardistheAnswer #infosec #CHIPS
To view or add a comment, sign in