You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: community/catalog/compromises/2025/ghost-action.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,10 +21,13 @@ open-source distribution chain.
21
21
22
22
## Type of Compromise
23
23
24
-
This compromise falls under _Publishing Infrastructure_category as the
25
-
attackers were able to compromise the underlying automation layer used to build
26
-
and publish software.
24
+
This compromise falls under the _Malicious Maintainer_category, as the attackers
25
+
gained access to legitimate GitHub maintainer accounts and leveraged their
26
+
privileges to inject malicious workflow code.
27
27
28
28
## References
29
29
30
-
-[The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/)
30
+
-[The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen)
31
+
-[What We Know About the NPM Supply Chain Attack](https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html)
32
+
-["Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)](https://unit42.paloaltonetworks.com/npm-supply-chain-attack)
33
+
-["Massive npm infection: the Shai-Hulud worm and patient zero"](https://securelist.com/shai-hulud-worm-infects-500-npm-packages-in-a-supply-chain-attack/117547)
Copy file name to clipboardExpand all lines: community/catalog/compromises/2025/nx-platform.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,11 +25,14 @@ thousands of interconnected development environments.
25
25
26
26
## Type of Compromise
27
27
28
-
This is an _Attack Chaining_ type of attack as it required multiple levels of
29
-
compromise.
28
+
This is an _Attack Chaining_ type of compromise with elements of _Dev Tooling_
29
+
and _Malicious Maintainer_, as the attackers initially leveraged compromised CI
30
+
workflows, published infected Nx packages, and chained the attack to expose
31
+
thousands of private repositories across the ecosystem.
30
32
31
33
## References
32
34
33
35
-[Serious NX build compromise - what you need to know about the s1ngularity attack](https://www.kaspersky.com/blog/nx-build-s1ngularity-supply-chain-attack/54223)
34
36
-[The Nx "s1ngularity" Attack: Inside the Credential Leak](https://blog.gitguardian.com/the-nx-s1ngularity-attack-inside-the-credential-leak/)
-[s1ngularity: Popular Nx Build System Package Compromised with Data-Stealing Malware](https://www.stepsecurity.io/blog/supply-chain-security-alert-popular-nx-build-system-package-compromised-with-data-stealing-malware)
0 commit comments