Home » Technology » Title: CISA: Monitor Systems After Major npm Supply Chain Attack

Title: CISA: Monitor Systems After Major npm Supply Chain Attack

by Rachel Kim – Technology Editor

CISA Alerts Organizations to Audit Dependencies After Major npm Supply chain Attack

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations to promptly review their software dependencies following a widespread supply chain attack targeting the Node Package Manager (npm) ecosystem. The attack, dubbed Shai-Hulud, involved a self-replicating worm that compromised over 500 software packages, according to StepSecurity.

The compromise allowed attackers to inject malware and search for sensitive credentials, including GitHub Personal Access Tokens and API keys for Amazon Web Services, Google Cloud Platform, and Microsoft Azure. These stolen credentials were than uploaded to a public repository named Shai-hulud. Palo Alto Networks’ Unit 42 researchers resolute the malicious script was written using a large Language Model (LLM), as detailed in an updated blog post released Tuesday.

GitHub responded to the incident Monday, taking action to mitigate the impact by removing more than 500 packages from the npm registry and blocking new packages containing indicators of compromise.

CISA recommends the following mitigation steps:

* Perform a comprehensive dependency review of all software utilizing npm packages.
* Search for cached versions of affected dependencies within artifact repositories and dependency management tools.
* Immediately rotate all developer credentials.
* Implement phishing-resistant multi-factor authentication on all developer accounts.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.