Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Summary
Hide ▲
Show ▼
Supply chain compromise in the Trivy vulnerability scanner triggered the CanisterWorm propagation across CI/CD pipelines, now expanding to additional open-source ecosystems and involving multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) and Cisco confirming collaboration and horizontal movement across cloud environments. A new npm supply chain malware campaign discovered on April 24, 2026, shows self-propagating worm-like behavior via @automagik/genie and pgserve packages, stealing credentials and spreading across developer ecosystems while using Internet Computer Protocol (ICP) canisters for command and control. The malware shares technical similarities with prior TeamPCP campaigns, including post-install scripts and canister-based infrastructure, potentially indicating ongoing evolution of the threat actor's tactics or a new campaign leveraging established infrastructure. The Axios NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with attribution disputes suggesting either TeamPCP involvement or North Korean actor UNC1069 (Google's Threat Intelligence Group). Cisco's internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories including proprietary AI product code and customer data from banks, BPOs, and US government agencies. Multiple AWS keys were abused across a subset of Cisco's cloud accounts, with multiple threat actors participating in the breach.
Timeline
-
31.03.2026 23:55 2 articles · 24d ago
UNC1069 attributed to Axios NPM package supply chain compromise via precision attack
The Axios JavaScript NPM package compromise via malicious versions 0.27.5 and 0.28.0 delivered a multi-platform RAT through a malicious dependency named 'plain-crypto-js', executing platform-specific second-stage payloads before anti-forensic cleanup. The attack originated from compromise of the lead maintainer's account 'jasonsaayman', bypassing Axios' OIDC-based publishing pipeline. Google's Threat Intelligence Group attributes the incident to suspected North Korean actor UNC1069, indicating a potential shift from initial TeamPCP attribution and suggesting actor diversification or false-flag operations in the expanding supply chain campaign targeting open-source ecosystems.
Show sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
31.03.2026 20:53 3 articles · 24d ago
Cisco dev environments breached using Trivy-linked malicious GitHub Actions
Cisco's internal development environment breach linked to the Trivy supply chain compromise continues to reveal broader impacts, with the theft of over 300 repositories including proprietary AI product code and code belonging to corporate customers such as banks, BPOs, and US government agencies. Attackers used stolen AWS keys to conduct unauthorized activities across a subset of Cisco's AWS accounts, with multiple threat actors observed participating in the breach. This phase is further supported by ongoing investigations into the operational sophistication of the Trivy-linked attacks, including the use of malicious GitHub Actions and the breadth of exfiltrated data across cloud-native environments.
Show sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
23.03.2026 15:14 6 articles · 1mo ago
CanisterWorm propagates via compromised Trivy scanner in CI/CD pipelines
CanisterWorm continues evolving its propagation mechanisms beyond the initial Trivy-based compromise, with new evidence of self-propagating npm malware campaigns using @automagik/genie and pgserve packages that steal credentials and spread via developer ecosystems. Socket research identifies worm-like behavior including npm token extraction, malicious package injection, and republish attempts, along with PyPI propagation capability via .pth file injection. The malware uses dual exfiltration channels (HTTPS webhook and ICP canisters) and targets sensitive data including cloud credentials, CI/CD tokens, SSH keys, browser-stored secrets, and cryptocurrency wallets—features that mirror prior TeamPCP-linked campaigns and infrastructure patterns, suggesting either ongoing evolution of TeamPCP's tactics or a new campaign leveraging established techniques and command-and-control infrastructure.
Show sources
- ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More — thehackernews.com — 23.03.2026 15:14
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
Information Snippets
-
Trivy vulnerability scanner, developed by Aqua Security, was backdoored with credential-stealing malware in its official releases and GitHub Actions.
First reported: 23.03.2026 15:143 sources, 3 articlesShow sources
- ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More — thehackernews.com — 23.03.2026 15:14
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The breach impacted over 32,000 GitHub stars and more than 100 million Docker Hub downloads.
First reported: 23.03.2026 15:143 sources, 3 articlesShow sources
- ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More — thehackernews.com — 23.03.2026 15:14
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The compromise enabled a self-propagating worm, CanisterWorm, to spread across impacted CI/CD pipelines and at least 100 organizations.
First reported: 23.03.2026 15:143 sources, 3 articlesShow sources
- ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More — thehackernews.com — 23.03.2026 15:14
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Threat actors leveraged the breach to steal secrets and distribute the worm, with many affected organizations failing to rotate credentials post-compromise.
First reported: 23.03.2026 15:143 sources, 3 articlesShow sources
- ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More — thehackernews.com — 23.03.2026 15:14
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
GitHub altered the default behavior of pull_request_target workflows in December 2025 to mitigate risks associated with GitHub Actions exploitation.
First reported: 23.03.2026 15:142 sources, 2 articlesShow sources
- ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More — thehackernews.com — 23.03.2026 15:14
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Threat actors compromised Trivy vulnerability scanner version 0.69.4 on March 19, 2026, injecting credential-stealing malware into official releases and GitHub Actions
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Additional malicious Docker images with tags 0.69.5 and 0.69.6 were uploaded to Docker Hub on March 22 without corresponding GitHub releases
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Compromised Trivy versions 0.69.5 and 0.69.6 contained indicators of compromise (IOC) linked to the TeamPCP infostealer
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Aqua Security identified unauthorized changes and repository tampering on March 22, 2026, during their ongoing investigation
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
An internal Aqua Security GitHub organization was briefly exposed with dozens of repositories renamed and made public during the attack
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The attacker used a compromised service account token with access to multiple GitHub organizations to rename repositories in a scripted burst lasting roughly two minutes
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The TeamPCP threat group has expanded operations to include worm propagation, ransomware deployment, cryptocurrency mining, and destructive attacks targeting Kubernetes environments
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Organizations using Trivy in CI/CD pipelines should review recent activity and treat recent scans as potentially compromised
First reported: 23.03.2026 17:052 sources, 2 articlesShow sources
- Trivy Supply Chain Attack Expands With New Compromised Docker Images — www.infosecurity-magazine.com — 23.03.2026 17:05
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
TeamPCP repurposed the Trivy supply chain infrastructure to deploy a wiper attack targeting systems in Iran or with Farsi locale settings, leveraging the same technical infrastructure used in the March 19, 2026 Trivy compromise
First reported: 23.03.2026 17:431 source, 1 articleShow sources
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The wiper payload executes only if the victim’s timezone or default language indicates Iran, otherwise it performs a local machine wipe; if Kubernetes access is detected, it destroys data on every node in the cluster
First reported: 23.03.2026 17:431 source, 1 articleShow sources
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The wiper campaign materialized over the weekend of March 21–22, 2026, and was orchestrated through Internet Computer Protocol (ICP) canisters that combine code and data to evade takedown attempts
First reported: 23.03.2026 17:431 source, 1 articleShow sources
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
TeamPCP operators claim in a Telegram group to have stolen vast amounts of sensitive data from major companies, including a large multinational pharmaceutical firm, and to have compromised Aqua Security a second time to spam GitHub accounts with junk messages
First reported: 23.03.2026 17:431 source, 1 articleShow sources
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
The malicious ICP canisters hosted the worm’s payload and alternated between serving malware downloads and redirecting visitors to a Rick Roll video, suggesting rapid iteration of malicious features
First reported: 23.03.2026 17:431 source, 1 articleShow sources
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
Security researchers describe TeamPCP as industrializing known attack techniques into a cloud-native exploitation platform that targets exposed Docker APIs, Kubernetes clusters, and Redis servers, with Azure accounting for 61% and AWS for 36% of compromised servers
First reported: 23.03.2026 17:431 source, 1 articleShow sources
- ‘CanisterWorm’ Springs Wiper Attack Targeting Iran — krebsonsecurity.com — 23.03.2026 17:43
-
TeamPCP compromised the LiteLLM Python package on PyPI, publishing malicious versions 1.82.7 and 1.82.8 that deploy an infostealer harvesting sensitive data
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
LiteLLM is a popular open-source Python library acting as a gateway to multiple LLM providers, with over 3.4 million daily downloads and 95 million downloads in the past month
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
The malicious LiteLLM payload executes when the package is imported, with version 1.82.8 introducing a '.pth' file named 'litellm_init.pth' that executes Python interpreter startup for persistence
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
The TeamPCP Cloud Stealer payload harvests SSH keys, cloud tokens, Kubernetes secrets, cryptocurrency wallets, .env files, and other sensitive credentials, and attempts lateral movement by deploying privileged pods to every Kubernetes node
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
Exfiltrated data is encrypted into tpcp.tar.gz and sent to attacker-controlled infrastructure at models.litellm.cloud
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
Both malicious LiteLLM versions have been removed from PyPI, with version 1.82.6 now the latest clean release
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
TeamPCP operators claim to have stolen data from approximately 500,000 devices during the LiteLLM attack, though this number remains unconfirmed by independent sources
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
The LiteLLM attack follows the TeamPCP compromise of Aqua Security's Trivy scanner and is part of a broader campaign affecting Aqua Security Docker images, Checkmarx KICS project, and now LiteLLM
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
TeamPCP's malicious payload contains credential-stealing logic identical to that used in the Trivy supply chain attack, indicating reuse of the same tooling and infrastructure
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
TeamPCP's cloud stealer installs a disguised systemd user service named 'System Telemetry Service' that periodically contacts checkmarx.zone to download and execute additional payloads
First reported: 25.03.2026 00:291 source, 1 articleShow sources
- Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack — www.bleepingcomputer.com — 25.03.2026 00:29
-
Security researchers at Wiz (now part of Google Cloud) observed TeamPCP validating, encrypting, and exfiltrating stolen credentials (cloud credentials, SSH keys, Kubernetes configuration files, and coding process secrets) to attacker-controlled domains.
First reported: 31.03.2026 15:151 source, 1 articleShow sources
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
-
Wiz researchers noted a 'dangerous convergence' between supply chain attackers like TeamPCP and extortion gangs such as Lapsus$, suggesting potential collaboration or sharing of exfiltrated secrets.
First reported: 31.03.2026 15:151 source, 1 articleShow sources
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
-
Wiz explicitly confirmed TeamPCP collaboration with the Lapsus$ extortion group to perpetuate chaos through follow-on attacks.
First reported: 31.03.2026 15:151 source, 1 articleShow sources
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
-
Wiz researcher Ben Read stated that TeamPCP is creating a 'snowball effect' by horizontally moving across cloud ecosystems (e.g., LiteLLM in over a third of cloud environments), requiring urgent security action.
First reported: 31.03.2026 15:151 source, 1 articleShow sources
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
-
Socket reported posts attributed to the Vect ransomware group on BreachForums announcing a partnership with TeamPCP to deploy ransomware across affected companies compromised in the Trivy/LiteLLM attacks.
First reported: 31.03.2026 15:151 source, 1 articleShow sources
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
-
Vect is a Russian-speaking ransomware-as-a-service (RaaS) group operating under an affiliate model, providing up to 80–88% profit shares to affiliates.
First reported: 31.03.2026 15:151 source, 1 articleShow sources
- TeamPCP Explores Ways to Exploit Stolen Supply Chain Secrets — www.infosecurity-magazine.com — 31.03.2026 15:15
-
Cisco’s internal development environment was breached using stolen credentials from the Trivy supply chain attack via a malicious GitHub Action plugin
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
Attackers used the malicious GitHub Action to exfiltrate data and credentials from Cisco’s build and development environments, impacting dozens of devices including developer and lab workstations
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
Multiple AWS keys were stolen during the Cisco breach and used to perform unauthorized activities across a small number of Cisco AWS accounts
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
Cisco isolated affected systems, reimaged devices, and initiated wide-scale credential rotation as part of incident response
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
More than 300 GitHub repositories were cloned during the Cisco breach, including source code for AI-powered products such as AI Assistants, AI Defense, and unreleased offerings
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
A portion of the stolen Cisco repositories allegedly belongs to corporate customers, including banks, BPOs, and US government agencies
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
Multiple threat actors were involved in the Cisco CI/CD and AWS account breaches, with varying levels of activity
First reported: 31.03.2026 20:531 source, 1 articleShow sources
- Cisco source code stolen in Trivy-linked dev environment breach — www.bleepingcomputer.com — 31.03.2026 20:53
-
The Axios JavaScript NPM package, with over 400 million monthly downloads, was compromised via malicious versions 0.27.5 and 0.28.0 published to NPM by threat actors impersonating the crypto-js library.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
Compromised Axios versions included a malicious dependency named 'plain-crypto-js' that executed a multi-platform remote access Trojan (RAT) capable of operating on Windows, Linux, and Mac systems.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
The RAT contacted live command-and-control servers to deliver platform-specific second-stage payloads before deleting itself and replacing the package.json with a clean version to evade forensic detection.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
The attack originated from the compromise of the lead maintainer's account 'jasonsaayman', bypassing Axios' OIDC-based publishing pipeline.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
Initial attribution suggested links to TeamPCP, but Google's Threat Intelligence Group attributed the incident to suspected North Korean threat actor UNC1069, indicating a potential shift in actor involvement.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
The malicious versions were active for approximately three hours before NPM removed them, with the malicious dependency exposed for over 21 hours prior to a security hold.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
The RAT performs device profiling (hostname, username, OS, processes, directory walk) before any further actions, suggesting a focus on access brokering or targeted espionage rather than indiscriminate data theft.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
Security experts describe the attack as 'operational sophistication' with pre-staged dependencies, platform-specific payloads, and anti-forensic measures, marking a new standard in open-source supply chain attack tradecraft.
First reported: 31.03.2026 23:551 source, 1 articleShow sources
- Axios NPM Package Compromised in Precision Attack — www.darkreading.com — 31.03.2026 23:55
-
Malicious npm packages @automagik/genie and pgserve linked to developer tooling workflows are distributing malware that steals credentials and attempts to spread across developer ecosystems
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
The malware executes during npm package installation, harvesting sensitive data including cloud credentials, CI/CD tokens, SSH keys, .npmrc files, shell histories, browser-stored data, and cryptocurrency wallets (MetaMask, Phantom)
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
Exfiltration occurs via HTTPS webhook and Internet Computer Protocol (ICP) canisters, with data encrypted using AES-256 and RSA or sent in plaintext
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
The malware self-propagates by extracting npm tokens, identifying accessible packages, injecting malicious code, and republishes compromised packages to spread further
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
Malware includes PyPI propagation capability via .pth file injection when credentials are available
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
Attack shows similarities to prior TeamPCP-linked campaigns including post-install scripts and canister-based infrastructure
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
Evidence suggests legitimate projects may have been hijacked, with some packages showing over 6,700 weekly downloads and inconsistencies between npm releases and Git tags
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
-
The scope of the attack is still evolving with additional malicious versions emerging and full impact not yet confirmed
First reported: 24.04.2026 11:101 source, 1 articleShow sources
- Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation — www.infosecurity-magazine.com — 24.04.2026 11:10
Similar Happenings
Compromise of CPUID distribution channels delivers trojanized system monitoring tools
A threat actor compromised CPUID’s distribution infrastructure to deliver trojanized versions of CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor between April 9–10, 2026, deploying the STX RAT alongside a multi-stage installer using DLL side-loading. The compromise lasted approximately 19 hours, affecting at least 150 victims across multiple sectors and geographies, with the attackers reusing infrastructure and tactics from a prior FileZilla campaign. CPUID confirmed the breach was limited to distribution links and has since restored clean versions, though the developer’s unavailability during the incident may have contributed to the prolonged exposure.
Targeted social engineering of Axios maintainer enables UNC1069 npm supply chain compromise via WAVESHAPER.V2 implant
A maintainer of the widely used Axios npm package was targeted in a highly tailored social engineering campaign attributed to North Korean threat actor UNC1069, resulting in the compromise of npm account credentials and the publication of two trojanized versions of Axios (1.14.1 and 0.30.4). Google Threat Intelligence Group (GTIG) attributed the attack to UNC1069 based on the use of WAVESHAPER.V2 and infrastructure overlaps with past activities. The malicious packages were available for roughly three hours and injected a plain-crypto-js dependency that installed a cross-platform RAT, enabling credential theft and downstream compromise. The campaign also targeted additional maintainers, including Pelle Wessman (Mocha framework) and Node.js core contributors, revealing a coordinated effort against high-impact maintainers. The intrusion began with reconnaissance-driven impersonation of a legitimate company founder, engagement via a cloned Slack workspace and Microsoft Teams call, and execution of a fake system update that deployed the RAT. Post-incident, the maintainer reset devices, rotated all credentials, adopted immutable releases, introduced OIDC-based publishing flows, and updated GitHub Actions workflows to mitigate future risks.
Drift Protocol administrative takeover and $285 million loss via Security Council manipulation on Solana
The April 1, 2026, $285 million Drift Protocol loss was part of a broader campaign by North Korea-linked Lazarus Group (TraderTraitor) targeting DeFi protocols. On April 18, 2026, the group executed a $290 million heist against KelpDAO by exploiting its cross-chain verification layer (DVN) via compromised RPC nodes, falsified data injection, and DDoS attacks, laundering funds through Tornado Cash. The attack paused KelpDAO’s rsETH contracts, froze Aave’s rsETH collateral usage, and was isolated to rsETH without broader contagion. Drift Protocol’s Security Council hijacking, attributed to UNC4736 (AppleJeus/Labyrinth Chollima), and KelpDAO’s DVN compromise both align with Lazarus Group’s pattern of sophisticated state-sponsored attacks on DeFi infrastructure.
Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency
A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks.
Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign
A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.