Skip to content

Commit 2e6e0c0

Browse files
committed
docs: updated compromise descriptions based on feedback provided
Signed-off-by: Yannis Folias <[email protected]>
1 parent 5a57cc7 commit 2e6e0c0

File tree

5 files changed

+22
-18
lines changed

5 files changed

+22
-18
lines changed

community/catalog/compromises/2025/changed-files.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@ pipelines.
2727

2828
## Type of Compromise
2929

30-
This is an _Attack Chaining_ type of attack as the attacker combined multiple
31-
weak links in the software delivery process.
30+
This is a _Publishing Infrastructure_ type of attack as the attacker targeted a
31+
GitHub action which is part of the CI/CD and build automation layer.
3232

3333
## References
3434

community/catalog/compromises/2025/ghost-action.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,13 @@ open-source distribution chain.
2121

2222
## Type of Compromise
2323

24-
This compromise falls under _Publishing Infrastructure_ category as the
25-
attackers were able to compromise the underlying automation layer used to build
26-
and publish software.
24+
This compromise falls under the _Malicious Maintainer_ category, as the attackers
25+
gained access to legitimate GitHub maintainer accounts and leveraged their
26+
privileges to inject malicious workflow code.
2727

2828
## References
2929

30-
- [The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/)
30+
- [The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen)
31+
- [What We Know About the NPM Supply Chain Attack](https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html)
32+
- ["Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)](https://unit42.paloaltonetworks.com/npm-supply-chain-attack)
33+
- ["Massive npm infection: the Shai-Hulud worm and patient zero"](https://securelist.com/shai-hulud-worm-infects-500-npm-packages-in-a-supply-chain-attack/117547)

community/catalog/compromises/2025/npm-ecosystem.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
<!-- cSpell:ignore Shai Hulud Shai hulud -->
22

3-
# Widespread npm Ecosystem Supply Chain Attack
3+
# Widespread npm Ecosystem Compromise
44

5-
The Widespread npm Supply Chain Attack, which began around September 8, 2025,
5+
The Widespread npm Ecosystem Compromise, which began around September 8, 2025,
66
was a multi-phased incident. The initial phase involved a phishing campaign that
77
compromised maintainer accounts, leading to the injection of a
88
cryptocurrency-stealing payload into dozens of popular packages (like chalk and
@@ -12,13 +12,11 @@ compromise over 500 npm packages.
1212

1313
## Impact
1414

15-
This compromise affected hundreds of packages and potentially thousands of
16-
downstream applications that automatically pulled the malicious versions. The
17-
injected payloads allowed for credential theft, unauthorized command execution,
18-
and persistent access in CI/CD environments. The incident exposed the fragility
19-
of transitive dependency trust and underscored the urgency of enforcing 2FA for
20-
maintainers, signed package publishing, and dependency integrity verification
21-
across the npm ecosystem.
15+
The compromise resulted in a widespread infection across the npm ecosystem,
16+
affecting hundreds of packages and potentially thousands of downstream
17+
applications that automatically pulled malicious versions. The injected payloads
18+
enabled credential theft, unauthorized command execution, and persistent access
19+
within both developer and CI/CD environments.
2220

2321
## Type of Compromise
2422

community/catalog/compromises/2025/nx-platform.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,14 @@ thousands of interconnected development environments.
2525

2626
## Type of Compromise
2727

28-
This is an _Attack Chaining_ type of attack as it required multiple levels of
29-
compromise.
28+
This is an _Attack Chaining_ type of compromise with elements of _Dev Tooling_
29+
and _Malicious Maintainer_, as the attackers initially leveraged compromised CI
30+
workflows, published infected Nx packages, and chained the attack to expose
31+
thousands of private repositories across the ecosystem.
3032

3133
## References
3234

3335
- [Serious NX build compromise - what you need to know about the s1ngularity attack](https://www.kaspersky.com/blog/nx-build-s1ngularity-supply-chain-attack/54223)
3436
- [The Nx "s1ngularity" Attack: Inside the Credential Leak](https://blog.gitguardian.com/the-nx-s1ngularity-attack-inside-the-credential-leak/)
3537
- [s1ngularity Nx Supply Chain Attack: AI-Driven Credential Theft & Mass Exposure](https://hivepro.com/threat-advisory/s1ngularity-nx-supply-chain-attack-ai-driven-credential-theft-mass-exposure/)
38+
- [s1ngularity: Popular Nx Build System Package Compromised with Data-Stealing Malware](https://www.stepsecurity.io/blog/supply-chain-security-alert-popular-nx-build-system-package-compromised-with-data-stealing-malware)

community/catalog/compromises/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ of compromise needs added, please include that as well.
3030
| Name | Year | Type of compromise | Link |
3131
| ----------------- | ------------------ | ------------------ | ----------- |
3232
| [Oracle Cloud SSO and Identity Infrastructure Compromise](2025/oracle-cloud.md) | 2025 | Publishing Infrastructure | [1](https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants) |
33-
| [Widespread npm Ecosystem Supply Chain Attack](2025/npm-ecosystem.md) | 2025 | Malicious Maintainer | [1](https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/) |
33+
| [Widespread npm Ecosystem Compromise](2025/npm-ecosystem.md) | 2025 | Malicious Maintainer | [1](https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/) |
3434
| [Red Hat Consulting GitLab Instance Breach](2025/rh-gitlab-instance.md) | 2025 | Publishing Infrastructure | [1](https://www.redhat.com/en/blog/security-update-incident-related-red-hat-consulting-gitlab-instance) |
3535
| [The Nx s1ngularity Attack Leading to Credentials Leak](2025/nx-platform.md) | 2025 | Attack Chaining | [1](https://www.kaspersky.com/blog/nx-build-s1ngularity-supply-chain-attack/54223/) |
3636
| [The GhostAction Github Workflow Injection](2025/ghost-action.md) | 2025 | Publishing Infrastructure | [1](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/) |

0 commit comments

Comments
 (0)