Malicious nx Packages Exfiltrate 2,349 GitHub, Cloud, and AI Credentials
Summary
Hide ▲
Show ▼
A supply chain attack on the nx build system allowed attackers to publish malicious versions of the popular npm package and auxiliary plugins. These versions contained data-gathering capabilities that exfiltrated 2,349 credentials from GitHub, cloud, and AI services. The attack occurred on August 26, 2025, affecting multiple versions of the nx package and related plugins. The compromised packages were removed from the npm registry, and users were advised to rotate credentials and check for malicious modifications in their systems. The malicious packages scanned file systems, collected credentials, and posted them to GitHub repositories under the users' accounts. The attack exploited a vulnerable workflow introduced on August 21, 2025, which allowed for arbitrary command execution and elevated permissions. The attack took approximately four hours from start to finish, resulting in the exfiltration of around 20,000 sensitive files. The attackers used AI-powered CLI tools to dynamically scan for high-value secrets and modified shell startup files to crash the system upon terminal session opening. A second attack wave was identified on August 28, 2025, affecting over 190 users/organizations and over 3000 repositories. The second wave involved making private repositories public and creating forks to preserve data. The attack unfolded in three distinct phases affecting 2,180 accounts and 7,200 repositories. The first phase impacted 1,700 users and leaked over 2,000 unique secrets. The second phase compromised 480 accounts and exposed 6,700 private repositories. The third phase targeted a single organization, publishing an additional 500 private repositories.
Timeline
-
06.09.2025 17:11 📰 1 articles · ⏱ 10d ago
Nx Team Implements Security Measures to Prevent Future Attacks
The Nx team adopted NPM's Trusted Publisher model and added manual approval for PR-triggered workflows to prevent future compromises.
Show sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
28.08.2025 21:39 📰 2 articles · ⏱ 19d ago
Attackers Exfiltrate 20,000 Files via AI-Powered CLI Tools
The attackers used AI-powered CLI tools like Claude, Q, and Gemini to search for and harvest sensitive credentials. The attackers tuned their prompts over multiple iterations to improve the success rate of the credential-stealing malware.
Show sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
28.08.2025 13:36 📰 3 articles · ⏱ 19d ago
Malicious nx Packages Exfiltrate 2,349 GitHub, Cloud, and AI Credentials
The attack unfolded in three distinct phases affecting 2,180 accounts and 7,200 repositories. The first phase impacted 1,700 users and leaked over 2,000 unique secrets. The second phase compromised 480 accounts and exposed 6,700 private repositories. The third phase targeted a single organization, publishing an additional 500 private repositories.
Show sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
Information Snippets
-
The nx build system, an open-source, technology-agnostic build platform, was targeted in a supply chain attack.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The malicious nx packages and plugins were published to npm and contained code to scan file systems and collect credentials.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The compromised versions of the nx package were removed from the npm registry.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack exploited a vulnerable workflow introduced on August 21, 2025, which allowed for arbitrary command execution.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The malicious packages affected multiple versions of the nx package and related plugins.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack exfiltrated 2,349 credentials, including GitHub OAuth keys, personal access tokens, API keys, and cloud credentials.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The malicious postinstall script modified .zshrc and .bashrc files to shut down the machine immediately upon execution.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The payload was capable of running only on Linux and macOS systems.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack weaponized installed AI CLI tools to steal file system contents.
First reported: 28.08.2025 13:36📰 3 sources, 3 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
A second attack wave was identified, affecting over 190 users/organizations and over 3000 repositories.
First reported: 28.08.2025 13:36📰 2 sources, 2 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The second wave involved making private repositories public and creating forks to preserve data.
First reported: 28.08.2025 13:36📰 2 sources, 2 articlesShow sources
- Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials — thehackernews.com — 28.08.2025 13:36
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack took approximately four hours from start to finish.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attackers published new versions of the nx package and infected versions of seven nx plugins.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack used AI-powered CLI tools to dynamically scan for high-value secrets.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack involved creating public repositories in the victim's GitHub account to store stolen data.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack modified shell startup files to crash the system upon terminal session opening.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack resulted in the exfiltration of around 20,000 sensitive files.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack affected over 1,000 developers, with around 25% successfully exfiltrating sensitive files.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack involved the use of AI CLI tools like Claude Code, Gemini, and Amazon Q.
First reported: 28.08.2025 21:39📰 2 sources, 2 articlesShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack was detected by multiple cybersecurity vendors.
First reported: 28.08.2025 21:39📰 1 source, 1 articleShow sources
- 1,000+ Devs Lose Their Secrets to an AI-Powered Stealer — www.darkreading.com — 28.08.2025 21:39
-
The attack unfolded in three distinct phases affecting 2,180 accounts and 7,200 repositories.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attack targeted Linux and macOS systems to steal GitHub tokens, npm tokens, SSH keys, .env files, and crypto wallets.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attackers used AI-powered CLI tools like Claude, Q, and Gemini to search for and harvest sensitive credentials.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The attackers tuned their prompts over multiple iterations to improve the success rate of the credential-stealing malware.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The first phase of the attack impacted 1,700 users and leaked over 2,000 unique secrets.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The second phase of the attack compromised 480 accounts and exposed 6,700 private repositories.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The third phase of the attack targeted a single organization, publishing an additional 500 private repositories.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
-
The Nx team adopted NPM's Trusted Publisher model and added manual approval for PR-triggered workflows to prevent future compromises.
First reported: 06.09.2025 17:11📰 1 source, 1 articleShow sources
- AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack — www.bleepingcomputer.com — 06.09.2025 17:11
Similar Happenings
Supply Chain Attack Targeting npm Registry Compromises 40 Packages
A supply chain attack targeting the npm registry has compromised over 187 packages maintained by multiple developers. The attack uses a malicious script (bundle.js) to steal credentials from developer machines. The compromised packages include various npm modules used in different projects. The attack is capable of targeting both Windows and Linux systems. The malicious script scans for secrets using TruffleHog's credential scanner and transmits them to an external server controlled by the attackers. Developers are advised to audit their environments and rotate credentials if the affected packages are present.
UNC6040 and UNC6395 Target Salesforce Platforms in Data Theft Campaigns
The FBI has issued an alert about two cybercriminal groups, UNC6040 and UNC6395, targeting Salesforce platforms for data theft and extortion. UNC6395 exploited compromised OAuth tokens for the Salesloft Drift application, while UNC6040 used vishing campaigns and modified Salesforce tools to breach Salesforce instances. Both groups have been active since at least October 2024, impacting multiple organizations. UNC6040 has been linked to extortion activities, with Google attributing these to a separate cluster, UNC6240, which has claimed to be the ShinyHunters group. The ShinyHunters group, along with Scattered Spider and LAPSUS$, recently announced they are going dark, but experts warn that the threat persists. UNC6040 impersonated corporate IT support personnel to gain access to Salesforce environments and used modified versions of Salesforce's Data Loader to exfiltrate data. Salesforce re-enabled integrations with Salesloft technologies, except for the Drift app, which remains disabled.
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.
Akira Ransomware Group Exploits SonicWall SSL VPN Flaws
The Akira ransomware group has been actively exploiting SonicWall SSL VPN flaws and misconfigurations to gain initial access to networks. This campaign has seen increased activity since late July 2025, targeting SonicWall devices to facilitate ransomware operations. The group leverages a combination of security vulnerabilities, including a year-old flaw (CVE-2024-40766) and misconfigured LDAP settings, to bypass access controls and infiltrate networks. Organizations are advised to rotate passwords, remove unused accounts, enable multi-factor authentication, and restrict access to the Virtual Office Portal to mitigate risks. The Australian Cyber Security Centre (ACSC) has acknowledged Akira's targeting of SonicWall SSL VPNs and issued alerts about the increased exploitation of CVE-2024-40766.
Cursor AI editor autoruns malicious code in repositories
A flaw in the Cursor AI code editor allows malicious repositories to execute arbitrary code automatically when opened. This vulnerability can lead to malware installation, environment hijacking, and credential theft. Cursor, an AI-powered IDE based on Visual Studio Code, disables the Workspace Trust feature by default, allowing this behavior. The flaw affects one million users who generate over a billion lines of code daily. Cursor developers have decided not to fix the issue, citing the need to maintain AI and other features. The vulnerability is part of a broader trend of prompt injections and jailbreaks affecting AI-powered coding and reasoning agents, which can embed malicious instructions to perform harmful actions or leak data.