AUTO-UPDATED

Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise

Recent supply chain attacks on open-source tools Trivy and Axios have compromised over 10,000 organizations, highlighting a growing trend of sophisticated social engineering and developer-focused malware campaigns.

Key Points

  • The vulnerability scanner Trivy was compromised by the group TeamPCP, leading to the theft of CI/CD secrets and cloud credentials from thousands of organizations.
  • North Korean-linked actors (UNC1069) hijacked the Axios JavaScript library by using AI-generated personas to trick a maintainer into installing a remote-access trojan.
  • TeamPCP utilized stolen credentials to inject malicious code into other open-source tools, including KICS, LiteLLM, and Telnyx.
  • Security experts warn that attackers are increasingly using AI to create hyper-personalized social engineering lures to target software developers.
  • Recommended defenses include implementing Software Bill of Materials (SBOMs), enforcing 24-hour delays on new software updates, and using physical verification methods for identity.

Why it Matters

These incidents demonstrate that open-source maintainers are now primary targets for attackers seeking to bypass traditional corporate security perimeters. By compromising widely used libraries, threat actors can gain massive, automated access to downstream enterprise environments, making comprehensive software inventory and identity verification essential for modern cybersecurity.
Theregister.com Published by Jessica Lyons
Read original