Skip to content

Commit 8695035

Browse files
committed
docs: add 2025 software supply chain compromises to catalog
1 parent e4187f3 commit 8695035

File tree

7 files changed

+210
-0
lines changed

7 files changed

+210
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
# tj-actions/changed-files GitHub Action Compromise
2+
3+
In March 2025, attackers compromised the popular GitHub Action
4+
`tj-actions/changed-files`, used by over 20,000 repositories to detect file
5+
changes in pull requests.
6+
7+
The threat actor compromised a maintainer's credentials to manipulate Git tags,
8+
redirecting trusted version references to a malicious commit that executed code
9+
during CI/CD workflows.
10+
11+
The injected code captured environment variables and exfiltrated secrets such as
12+
GitHub tokens and API credentials to an external server. This compromise
13+
propagated silently through automated pipelines, as many users relied on mutable
14+
version tags (e.g., v35, v36) instead of immutable commit SHAs, meaning their
15+
workflows automatically pulled and executed the malicious code.
16+
17+
## Impact
18+
19+
This compromise had multiple implications across the GitHub Actions ecosystem
20+
as thousands of repositories were possibly exposed through automate workflows,
21+
any CI/CD runner secrets, repository tokens or organization credentials were
22+
potentially at risk, and overall demonstrated how a single third-party action
23+
could become a high-impact attack vector within trusted build automation
24+
pipelines.
25+
26+
## Type of Compromise
27+
28+
This is an _Attack Chaining_ type of attack as the attacker combined multiple
29+
weak links in the software delivery process.
30+
31+
## References
32+
33+
- [GitHub Advisory Database - GHSA-mrrh-fwg8-r2c3](https://github.com/advisories/GHSA-mrrh-fwg8-r2c3/)
34+
- [Wiz.io – GitHub Action tj-actions/changed-files Supply Chain Attack (CVE-2025-30066)](https://www.wiz.io/blog/github-action-tj-actions-changed-files-supply-chain-attack-cve-2025-30066)
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
# The GhostAction Github Workflow Injection
2+
3+
In September 2025, GitGuardian discovered GhostAction campaign, a large-scale
4+
supply chain campaign in which attackers compromised 327 GitHub user accounts
5+
and injected malicious workflows into 817 repositories, stealing a total of 3,325
6+
secrets. The malicious workflows, often titled "Github Actions Security",
7+
were engineered to enumerate known secret names from legitimate workflow files
8+
(e.g. PyPI tokens, npm tokens, DockerHub, AWS keys) and exfiltrate them via HTTP
9+
POST to attacker-controlled endpoints.
10+
11+
## Impact
12+
13+
The GhostAction campaign compromised the trust and integrity of GitHub's
14+
publishing pipelines, exposing sensitive credentials from hundreds of
15+
open-source projects. The stolen secrets, including registry tokens and cloud
16+
provider keys, could enable attackers to publish malicious packages, access
17+
private infrastructure, or escalate to broader supply chain compromises across
18+
ecosystems like npm, PyPI, and DockerHub. This incident highlights how
19+
manipulating CI/CD workflows can undermine the integrity of the entire
20+
open-source distribution chain.
21+
22+
## Type of Compromise
23+
24+
This compromise falls under _Publishing Infrastructure_ category as the
25+
attackers were able to compromise the underlying automation layer used to build
26+
and publish software.
27+
28+
## References
29+
30+
- [The GhostAction Campaign: 3,325 Secrets Stolen Through Compromised GitHub Workflows](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/)
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
# Widespread npm Ecosystem Supply Chain Attack
2+
3+
The Widespread npm Supply Chain Attack, which began around September 8, 2025,
4+
was a multi-phased incident. The initial phase involved a phishing campaign that
5+
compromised maintainer accounts, leading to the injection of a
6+
cryptocurrency-stealing payload into dozens of popular packages (like chalk and
7+
debug). This was quickly followed by the discovery of the "Shai-Hulud" worm
8+
campaign, which used a self-propagating credential-stealing malware to
9+
compromise over 500 npm packages.
10+
11+
## Impact
12+
13+
This compromise affected hundreds of packages and potentially thousands of
14+
downstream applications that automatically pulled the malicious versions. The
15+
injected payloads allowed for credential theft, unauthorized command execution,
16+
and persistent access in CI/CD environments. The incident exposed the fragility
17+
of transitive dependency trust and underscored the urgency of enforcing 2FA for
18+
maintainers, signed package publishing, and dependency integrity verification
19+
across the npm ecosystem.
20+
21+
## Type of Compromise
22+
23+
The npm ecosystem is a _Malicious Maintainer_ type of attack as the attackers
24+
managed to gain control of npm maintainer accounts and used their privileges to
25+
push malicious versions of legitimate packages.
26+
27+
## References
28+
29+
- [Breakdown: Widespread npm Supply Chain Attack Puts Billions of Weekly Downloads at Risk](https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/)
30+
- [Ongoing Supply Chain Attack Involving npm Packages](https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-093)
31+
- [Shai-hulud supply chain attack spreads token-stealing malware on npm](https://www.reversinglabs.com/blog/shai-hulud-worm-npm)
32+
- [npm Chalk and Debug Packages Hit in Software Supply Chain Attack](https://www.sonatype.com/blog/npm-chalk-and-debug-packages-hit-in-software-supply-chain-attack)
33+
- [Another npm Supply Chain Attack: The 'is' Package Compromise](https://www.stepsecurity.io/blog/another-npm-supply-chain-attack-the-is-package-compromise)
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
# The Nx s1ngularity Attack Leading to Credentials Leak
2+
3+
On August 26, 2025, attackers released malicious versions of the nx and @nx/*
4+
npm packages (versions 20.9.0 through 21.8.0). The trojanized packages contained
5+
credential-harvesting malware that scanned each developer system for sensitive
6+
artifacts: GitHub tokens, npm keys, SSH private keys, environment variables,
7+
cryptocurrency wallet files, and AI tool configurations. The malware exfiltrated
8+
stolen credentials via double Base64 encoding and published them to over 1,400
9+
public GitHub repositories, each named in a "s1ngularity-repository-*" pattern
10+
with a single `results.b64` file containing encoded data.
11+
12+
## Impact
13+
14+
The Nx s1ngularity attack had an extensive impact across the open-source and
15+
enterprise ecosystem. In total, over 20,000 files were exfiltrated, affecting
16+
more than 1,700 users worldwide. The attackers leveraged stolen credentials to
17+
make at least 6,700 private GitHub repositories public, exposing sensitive
18+
source code, proprietary configurations, and credentials — some belonging to
19+
major organizations and high-profile projects. This extensive exposure
20+
underscored the cascading risk of software supply chain compromises, where a
21+
single poisoned package can rapidly undermine trust and security across
22+
thousands of interconnected development environments.
23+
24+
## Type of Compromise
25+
26+
This is an _Attack Chaining_ type of attack as it required multiple levels of
27+
compromise.
28+
29+
## References
30+
31+
- [Serious NX build compromise - what you need to know about the s1ngularity attack](https://www.kaspersky.com/blog/nx-build-s1ngularity-supply-chain-attack/54223/)
32+
- [The Nx "s1ngularity" Attack: Inside the Credential Leak](https://blog.gitguardian.com/the-nx-s1ngularity-attack-inside-the-credential-leak/)
33+
- [s1ngularity Nx Supply Chain Attack: AI-Driven Credential Theft & Mass Exposure](https://hivepro.com/threat-advisory/s1ngularity-nx-supply-chain-attack-ai-driven-credential-theft-mass-exposure/)
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
# Oracle Cloud SSO and Identity Infrastructure Compromise
2+
3+
The Oracle Cloud data breach, publicly disclosed around March 21, 2025, involved
4+
a large-scale compromise of authentication and identity management systems. A
5+
threat actor operating under the alias "rose87168" announced on the black-hat
6+
forum BreachForums that they had exfiltrated a significant number of records
7+
from Oracle Cloud's federated Single Sign-On (SSO) login servers and Lightweight
8+
Directory Access Protocol (LDAP) systems.
9+
10+
The attacker claimed the initial infiltration occurred around mid-February 2025,
11+
possibly exploiting a vulnerability in an older, unpatched component of the
12+
infrastructure, such as Oracle Fusion Middleware 11G or a critical flaw in
13+
Oracle Access Manager (potentially related to CVE-2021-35587). The compromise is
14+
generally believed to have affected legacy Gen 1 servers and not the primary
15+
Oracle Cloud Infrastructure (OCI) Gen 2 environment.
16+
17+
## Impact
18+
19+
The impact was focused on the mass compromise of critical authentication data,
20+
significantly increasing security risks for numerous organizations. The 6
21+
million records stolen included sensitive credentials such as encrypted
22+
SSO/LDAP passwords, key files, and authentication tokens. This exposure created
23+
a high risk of unauthorized account takeover, corporate espionage, and lateral
24+
movement within affected customers' environments, particularly if the encrypted
25+
credentials could be cracked. Furthermore, the threat actor sought to monetize
26+
the breach through extortion, demanding fees from companies to remove their data
27+
from the leak. The incident led to CISA guidance on credential risk mitigation
28+
and resulted in class action lawsuits against Oracle for alleged failure to
29+
implement standard data security practices and timely disclosure.
30+
31+
## Type of Compromise
32+
33+
Even though this was not related to a software package, this is considered to be
34+
a _Publishing Infrastructure_ type of compromise as it originated from
35+
vulnerabilities within Oracle’s identity and authentication infrastructure, a
36+
critical part of its service publishing and access layer.
37+
38+
## References
39+
40+
- [CloudSEK – The Biggest Supply Chain Hack of 2025: 6M Records Exfiltrated from Oracle Cloud](https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants)
41+
- [CVE-2021-35587 – Oracle Access Manager Remote Code Execution Vulnerability](https://nvd.nist.gov/vuln/detail/CVE-2021-35587)
42+
- [Oracle Cloud Breaches Lead to CISA Guidance and Lawsuits](https://www.americanbar.org/groups/health_law/news/2025/4/oracle-cloud-breaches-lead-to-cisa-guidance-lawsuits/)
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Red Hat Consulting GitLab Instance Breach
2+
3+
In October 2025, Red Hat confirmed a security breach affecting a self-hosted
4+
GitLab instance used internally by its Consulting division. The threat actor
5+
group calling themselves Crimson Collective claimed responsibility, asserting
6+
they had exfiltrated approximately 570 GB of compressed data from 28,000 private
7+
repositories, including around 800 Customer Engagement Reports (CERs). These
8+
CERs often contain sensitive customer architecture diagrams, configuration files,
9+
authentication tokens, and infrastructure details.
10+
11+
## Impact
12+
13+
Attackers claim to have accessed a significant volume of sensitive consulting
14+
and customer data.Stolen CERs may reveal network topologies, access credentials,
15+
and deployment configurations for major enterprise clients. That kind of
16+
information could be leveraged for secondary intrusions or social engineering.
17+
While Red Hat has not confirmed any misuse of the stolen data, the incident
18+
highlights the inherent risk of third-party data exposure within vendor
19+
ecosystems. Red Hat emphasized that no personal data or software supply chain
20+
assets have been confirmed compromised at this stage.
21+
22+
## Type of Compromise
23+
24+
This is a _Publishing Infrastructure_ type of compromise as the compromise
25+
occurred within Red Hat’s internal GitLab environment, which is part of its
26+
development and collaboration infrastructure.
27+
28+
## References
29+
30+
- [Security update: Incident related to Red Hat Consulting GitLab instance](https://www.redhat.com/en/blog/security-update-incident-related-red-hat-consulting-gitlab-instance)
31+
- [Red Hat confirms security incident after hackers breach GitLab instance](https://www.bleepingcomputer.com/news/security/red-hat-confirms-security-incident-after-hackers-breach-gitlab-instance)
32+
- [Red Hat GitLab Data Breach: The Crimson Collective's Attack](https://blog.gitguardian.com/red-hat-gitlab-breach-the-crimson-collectives-attack/)

community/catalog/compromises/README.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,12 @@ of compromise needs added, please include that as well.
2929
<!-- cSpell:disable -->
3030
| Name | Year | Type of compromise | Link |
3131
| ----------------- | ------------------ | ------------------ | ----------- |
32+
| [Oracle Cloud SSO and Identity Infrastructure Compromise](2025/oracle-cloud.md) | 2025 | Publishing Infrastructure | [1](https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants) |
33+
| [Widespread npm Ecosystem Supply Chain Attack](2025/npm-ecosystem.md) | 2025 | Malicious Maintainer | [1](https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/) |
34+
| [Red Hat Consulting GitLab Instance Breach](2025/rh-gitlab-instance.md) | 2025 | Publishing Infrastructure | [1](https://www.redhat.com/en/blog/security-update-incident-related-red-hat-consulting-gitlab-instance) |
35+
| [The Nx s1ngularity Attack Leading to Credentials Leak](2025/nx-platform.md) | 2025 | Attack Chaining | [1](https://www.kaspersky.com/blog/nx-build-s1ngularity-supply-chain-attack/54223/) |
36+
| [The GhostAction Github Workflow Injection](2025/ghost-action.md) | 2025 | Publishing Infrastructure | [1](https://blog.gitguardian.com/ghostaction-campaign-3-325-secrets-stolen/) |
37+
| [tj-actions/changed-files GitHub Action Compromise](2025/changed-files.md) | 2025 | Attack Chaining | [1](https://github.com/advisories/GHSA-mrrh-fwg8-r2c3/) |
3238
| [Solana Web3.js Code Injection](2024/solana_web3js.md) | 2024 | Social Engineering/Phishing Attack | [1](https://www.reversinglabs.com/blog/malware-found-in-solana-npm-library-with-50m-downloads) [2](https://x.com/0xMert_/status/1864069157257613719) |
3339
| [Polyfill.io Infrastructure Takeover Leading to Malware Distribution](2024/polyfill.md) | 2024 | Publishing Infrastructure | [1](https://sansec.io/research/polyfill-supply-chain-attack) |
3440
| [Malware Disguised as Installer used to target Korean Public Institution](2024/targeted-signed-endoor.md) | 2024 | Trust and Signing | [1](https://asec.ahnlab.com/en/63396/) |

0 commit comments

Comments
 (0)