Trending

#JavaScriptsecurity

Latest posts tagged with #JavaScriptsecurity on Bluesky

Latest Top
Trending

Posts tagged #JavaScriptsecurity

Preview
New Shai Hulud Malware Variant Turns Developers Into Supply Chain Attack Vectors, Expel Warns   A newly released report from managed detection and response firm Expel Inc. reveals an advanced variant of the Shai Hulud malware, highlighting how software supply chain attacks are moving beyond isolated malicious packages to large-scale, self-spreading campaigns that exploit developers as unwitting distribution channels. Originally detected in September, the Shai Hulud malware campaign targets the JavaScript ecosystem and prioritizes supply chain compromise over conventional endpoint attacks. It spreads through trojanized Node Package Manager (npm) packages designed to steal credentials and replicate across developer environments. According to Expel, the latest iteration of Shai Hulud automates the takeover of developer systems and the npm registry by combining credential harvesting, cloud secret extraction and rapid self-propagation. The malware is typically triggered during an npm install process on a developer’s machine or within continuous integration and continuous delivery pipelines. Once activated, the malicious package initiates a two-stage infection process. In the first phase, it prepares the environment by installing the Bun JavaScript runtime if it is not already available. The second phase launches a highly obfuscated background payload responsible for stealing credentials, exfiltrating data and spreading the infection further. The malware conducts extensive searches for sensitive information stored locally, including cloud access keys, npm publishing tokens and GitHub login credentials. It also uses the TruffleHog security scanning tool to comb through a victim’s home directory, identifying hard-coded secrets hidden in source code, configuration files and git history. When cloud credentials are discovered, Shai Hulud escalates its activity by directly querying cloud-based secret management services such as Amazon Web Services Inc.’s Secrets Manager, Microsoft Corp.’s Azure Key Vault and Google LLC’s Cloud Secret Manager to retrieve additional confidential data. Rather than relying on traditional command-and-control infrastructure, the malware blends into normal developer workflows by abusing GitHub services. Stolen credentials and system details are exfiltrated to newly created public GitHub repositories, while infected systems are registered as self-hosted GitHub Actions runners, providing attackers with persistent remote access. To maintain and expand the campaign, Shai Hulud exploits compromised developer accounts by injecting malicious code into other npm packages owned by the victim. These altered packages are then automatically published to the registry, allowing the malware to continue spreading. Expel estimates that the campaign has affected more than 25,000 repositories and hundreds of npm packages, including those linked to widely used developer tools. The report concludes that Shai Hulud signals a fundamental change in supply chain risk by targeting the trust mechanisms underlying modern software development. While the current activity is focused on npm, Expel cautions that similar attacks could surface in other ecosystems built on comparable trust models, such as PyPI, RubyGems and Composer.

New Shai Hulud Malware Variant Turns Developers Into Supply Chain Attack Vectors, Expel Warns #cloudsecrettheft #developercredentialtheft #JavaScriptsecurity

0 0 0 0

If you rely on Elysia in production, review your validations and update now. Prototype-pollution chains are regularly abused in real-world exploits—don’t wait for this one to become the next incident. buff.ly/RCQHiLI
#ElysiaJS #AppSec #RCE #SecureDevelopers #JavaScriptSecurity 🧵5/5

0 0 0 0
Preview
Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT Researchers detail JS#SMUGGLER, a multi-stage web attack using JavaScript, HTA, and PowerShell to deploy NetSupport RAT on targeted systems.

Experts confirm JSSmuggler is using JavaScript trickery to bypass filters and deliver payloads — weaponized obfuscation at scale. Stay vigilant. 🧩⚠️ #Malware #JavaScriptSecurity

0 0 0 0
Preview
NPM Nightmare: & Cloudflare AI That Secured End Users From 2 Billion Weekly Malicious Downloads The Billion-Download Backdoor: Defending Client-Side Supply Chains Against Crypto-Draining NPM Attacks -------------------------------------------------------------------------------- Episode Notes In early September 2025, the open-source software ecosystem faced a massive supply chain attack when attackers compromised trusted maintainer accounts on npm using targeted phishing emails. This security breach led to the injection of malicious code into 18 widely used npm packages—such as chalk, debug, and ansi-styles—which together account for more than 2 billion downloads per week. This episode dives into the mechanics of the attack, the threat posed by the complex malware deployed, and the role of advanced AI-powered defenses in preventing client-side disaster. Key Takeaways The Threat Landscape The attackers' primary goal was crypto-stealing or wallet draining. The compromised packages contained obfuscated JavaScript, which, when included in end-user applications (including web projects and mobile apps built with frameworks like React Native or Ionic), was activated at the browser level. This malware would intercept network traffic and API requests, ultimately swapping legitimate cryptocurrency addresses (including Bitcoin, Ethereum, and Solana) with the attackers' wallets. The attack leveraged the human factor, as maintainers were tricked by phishing emails urging them to update two-factor authentication credentials via a fake domain, npmjs[.]help. The Evolution of Malware: Shai-Hulud Beyond crypto-hijacking, researchers detected a complex self-replicating worm dubbed Shai-Hulud. This advanced payload targets development and CI/CD environments: • Autonomous Propagation: Shai-Hulud uses existing trust relationships to automatically infect additional NPM packages and projects. • Credential Theft: Using stolen GitHub access tokens, the worm lists and clones private repositories to attacker-controlled accounts. • Secret Harvesting: It downloads and utilizes the secret-scanning tool TruffleHog to harvest secrets, keys, and high-entropy strings from the compromised environment. • Malicious Workflows: Shai-Hulud establishes persistence by injecting malicious GitHub Actions workflows into repositories, enabling automated secret exfiltration. Automated Defense with AI Security Cloudflare’s client-side security offering, Page Shield, proved critical in mitigating this threat. Page Shield assesses 3.5 billion scripts per day (40,000 scripts per second) using machine learning (ML) based malicious script detection. • Page Shield utilizes a message-passing graph convolutional network (MPGCN). This graph-based model learns hacker patterns purely from the structure (e.g., function calling) and syntax of the code, making it resilient against advanced techniques like code obfuscation used in the npm compromise. • Cloudflare verified that Page Shield would have successfully detected all 18 compromised npm packages as malicious, despite the attack being novel and not present in the initial training data. • While patches were released quickly (in 2 hours or less), Page Shield was already equipped to detect and block this threat, helping users "dodge the proverbial bullet". Security Recommendations To protect against fast-moving supply chain attacks, organizations must maintain vigilance and implement automated defenses: 1. Audit Dependencies: Review your dependency tree, checking for versions published around early–mid September 2025. Developers should pin dependencies to known-good versions. 2. Rotate Credentials: Immediately revoke and reissue any exposed CI/CD tokens, cloud credentials, or service keys that might have been used in the build pipeline. 3. Enforce MFA: Tighten access policies and enforce multi-factor authentication (MFA) on all developer and CI/CD access points. 4. Proactive Monitoring: Monitor build logs and environments for signs of suspicious scanning activity, such as the use of TruffleHog. -------------------------------------------------------------------------------- 🔗 Relevant Links and Resources • Cloudflare: https://blog.cloudflare.com/how-cloudflares-client-side-security-made-the-npm-supply-chain-attack-a-non/     ◦ Cloudflare Page Shield Script detection • Trend Micro Research: What We Know About the NPM Supply Chain Attack • Kaspersky Blog: Popular npm packages compromised 🛡️ Sponsor This episode of Upwardly Mobile is brought to you by our friends at https://approov.io/mobile-app-security/rasp/. -------------------------------------------------------------------------------- Keywords: NPM supply chain attack, Cloudflare Page Shield, Shai-Hulud worm, Cryptohijacker, crypto-stealing malware, client-side security, JavaScript obfuscation, open-source security, dependency audit, CI/CD security, phishing attack, MPGCN, machine learning security, developer accounts compromise, npm packages, software security.          

📣 New Podcast! "NPM Nightmare: & Cloudflare AI That Secured End Users From 2 Billion Weekly Malicious Downloads" on @Spreaker #aiinsecurity #approov #clientsidesecurity #cloudflarepageshield #cryptostealing #cybersecurity #devsecops #javascriptsecurity #npmsecurity #shaihulud #supplychainattack

0 0 0 0
Preview
Chainguard's Malware-Resistant JavaScript Libraries | AI News Protect your JavaScript apps! Chainguard's new libraries offer malware-resistant dependencies. Secure your software supply chain now.

AIMindUpdate News!
Worried about JavaScript vulnerabilities? Chainguard offers malware-resistant libraries, fortifying your software supply chain! #JavaScriptSecurity #SupplyChainSecurity #Chainguard

Click here↓↓↓
aimindupdate.com/2025/10/05/c...

0 0 0 0

Angular 20 y NestJS Innovación vs Seguridad - El Dilema del Desarrollo Web Moderno www.tecnual.com #InteligenciaArtificial #Angular20 #JavaScriptSecurity #NestJS2025

0 0 0 0
Preview
The npm incident frightened everyone, but ended up being nothing to fret about Disaster was averted after widely used open-source packages were compromised via social engineering.

Open-source developers targeted in ongoing npm supply chain attacks, with malicious packages mimicking popular tools to steal credentials.
#npm #SupplyChainAttack #OpenSource #DevSecOps #CredentialTheft #CyberSecurity #JavaScriptSecurity cyberscoop.com/open-source-...

1 0 0 0
Preview
Introduction to JavaScript Security (LFS184) | Linux Foundation Education Master secure coding with our free course, Introduction to JavaScript Security (LFS184)—essential for today’s web developers.

🆕 🆓 Secure Code = Stronger Career! Our newest, free course, Introduction to JavaScript Security (LFS184), gives developers the tools to build safer apps and make their career profile stand out.

Enroll today for free: training.linuxfoundation.org/training/int...

#JavaScriptSecurity #SecureCoding

16 5 0 0
Preview
Introduction to JavaScript Security (LFS184) | Linux Foundation Education Master secure coding with our free course, Introduction to JavaScript Security (LFS184)—essential for today’s web developers.

🆕🆓 New course: Introduction to JavaScript Security
Stand out as a dev by learning to:
🔸 Spot risks early
🔸 Deliver more than working code
🔸 Build trust with your team
Think like a defender—enroll free today: training.linuxfoundation.org/training/int...
#JavaScriptSecurity #SecureCoding #WebDev

7 0 0 0
Post image Post image Post image Post image

JavaScript Code Security Tips 🔐

Here are some key practices:
✅ Always sanitize user inputs to prevent XSS attacks
✅ Avoid using dangerous functions like eval()
✅ Use HTTPS to secure data transmission
✅ Keep your third-party dependencies up to date

#JavaScriptSecurity #WebDev #SecureCoding

1 0 0 0
Preview
HeroDevs Blog | Securing Transitive Dependencies in End-of-Life Software: A Guide Learn how to secure your JavaScript applications against vulnerabilities in transitive dependencies—especially when using end-of-life (EOL) packages. This guide covers npm versioning strategies, updat...

Just put together a guide on the often-overlooked challenge of securing transitive dependencies in End-of-Life JavaScript software. If you've ever wondered when to use ^ vs ~ in your package.json (and why it matters), check it out:

www.herodevs.com/blog-posts/s...

#JavaScriptSecurity #security

1 0 0 0