Skip to content

Appendix f

Appendix F: Major Supply Chain Incident Timeline

This appendix provides a chronological reference of significant software supply chain incidents that have shaped our understanding of supply chain security risks. Each entry documents what happened, the scope of impact, key lessons learned, and sources for further investigation. These incidents span four decades, demonstrating both the evolution of attack techniques and the persistent nature of supply chain vulnerabilities.

Disclaimer on Incident Information: All incident descriptions in this appendix are based on publicly available information, security research reports, and official disclosures as of the publication date (January 2026). Details about security incidents may be:

  • Incomplete due to ongoing investigations or undisclosed information
  • Subject to interpretation based on available evidence
  • Disputed by organizations or individuals mentioned
  • Updated as new information emerges after publication

Attribution statements (e.g., "attributed to [threat actor]") reflect assessments by security researchers, government agencies, or industry analysts based on available indicators. Such attributions represent informed professional judgment rather than legal findings or definitive proof.

Organizations and individuals mentioned are referenced for educational purposes to document publicly reported incidents. Such references do not constitute accusations, legal findings, or claims of wrongdoing beyond what has been publicly reported and documented in cited sources.

Readers should consult cited sources for the most current information and official statements from involved parties.


1984

Reflections on Trusting Trust

Date: October 1984

Summary: Ken Thompson delivered his Turing Award lecture "Reflections on Trusting Trust," demonstrating how a compiler could be modified to insert a backdoor into any program it compiles—including future versions of the compiler itself. Thompson showed that even if you inspect source code and find it clean, you cannot trust the compiled binary unless you trust the entire toolchain that produced it.

Impact Scope: Conceptual/theoretical demonstration affecting all compiled software

Key Lessons:

  • Trust in software must extend to the entire build toolchain, not just source code
  • Self-replicating backdoors can persist across compiler generations without appearing in source
  • Binary verification and reproducible builds are essential for establishing trust
  • The "trusting trust" problem remains fundamentally unsolved for most software

Sources:

  • Thompson, K., "Reflections on Trusting Trust," Communications of the ACM, 19841

2008

Debian OpenSSL Weak Key Generation (CVE-2008-0166)

Date: May 13, 2008 (disclosed)

Summary: A Debian maintainer inadvertently removed critical entropy-gathering code from OpenSSL in 2006 while addressing a Valgrind warning. This reduced the randomness of generated cryptographic keys to approximately 32,767 possible values per architecture and key size. The vulnerability persisted undetected for nearly two years in Debian and derivative distributions including Ubuntu.

Impact Scope: All cryptographic keys generated on affected Debian-based systems from September 2006 to May 2008, including SSH keys, SSL certificates, and OpenVPN keys

Key Lessons:

  • Security-critical code changes require expert review, even for seemingly minor modifications
  • Upstream maintainers and downstream packagers must communicate effectively about changes
  • Cryptographic code is especially sensitive—warnings may indicate security features, not bugs
  • Long detection times for subtle vulnerabilities highlight the need for security auditing

Sources:

  • Debian Security Advisory DSA-1571-12
  • CVE-2008-01663
  • Schneier, B., "Random Number Bug in Debian Linux," 20084

2014

Heartbleed (CVE-2014-0160)

Date: April 7, 2014 (disclosed)

Summary: A buffer over-read vulnerability in OpenSSL's implementation of the TLS heartbeat extension allowed attackers to read up to 64KB of server memory per request, potentially exposing private keys, session tokens, passwords, and other sensitive data. The bug was introduced in December 2011 and affected OpenSSL versions 1.0.1 through 1.0.1f.

Impact Scope: Estimated 17% of internet SSL servers (approximately 500,000 servers) at time of disclosure; affected major services including Yahoo, Imgur, and numerous others

Key Lessons:

  • Critical infrastructure software often lacks adequate funding and maintainer resources
  • Memory-unsafe languages (C) in security-critical code present persistent risks
  • Widespread dependencies on single implementations create systemic vulnerability
  • Led directly to formation of the Core Infrastructure Initiative (now OpenSSF)

Sources:

  • Heartbleed.com5
  • CVE-2014-01606
  • Durumeric, Z., et al., "The Matter of Heartbleed," IMC 20147

2016

left-pad Incident

Date: March 22, 2016

Summary: Developer Azer Koculu unpublished 273 NPM packages, including the 11-line left-pad utility, following a trademark dispute with messaging app Kik. Because left-pad was a dependency of Babel, React, and thousands of other projects, builds worldwide began failing immediately. NPM took the unprecedented step of un-unpublishing the package to restore service.

Impact Scope: Thousands of JavaScript projects experienced build failures; major frameworks including React and Babel were affected; incident lasted approximately 2.5 hours before NPM intervention

Key Lessons:

  • Micro-dependencies create fragile dependency chains
  • Package registries need policies governing package removal
  • Build systems should not assume package availability
  • Dependency vendoring and lock files provide resilience against upstream changes

Sources:

  • Koculu, A., "I've Just Liberated My Modules," 20168
  • Williams, C., "How one developer just broke Node, Babel and thousands of projects," The Register, 20169
  • NPM Blog, "kik, left-pad, and npm," 201610

2018

event-stream Compromise

Date: November 26, 2018 (disclosed)

Summary: A malicious actor gained maintainership of the popular event-stream NPM package through social engineering, then added a dependency on flatmap-stream containing obfuscated code targeting the Copay Bitcoin wallet. The attack specifically extracted private keys from Copay wallet users. The original maintainer had transferred control after the attacker offered to help maintain the project.

Impact Scope: event-stream had approximately 2 million weekly downloads; the malicious payload specifically targeted Copay wallet versions 5.0.2 through 5.1.0

Key Lessons:

  • Maintainer succession requires careful vetting and trust establishment
  • Transitive dependencies can introduce malicious code without direct project changes
  • Targeted attacks may hide within broadly-used packages
  • Package consumers should monitor for unexpected dependency additions

Sources:

  • GitHub Issue #116, "I don't know what to say," dominictarr/event-stream11
  • Snyk, "Malicious code found in npm package event-stream," 201812
  • NPM Security Advisory13

2020

SolarWinds SUNBURST Attack

Date: December 13, 2020 (disclosed); attack began March 2020

Summary: Nation-state actors (attributed to Russian SVR) compromised SolarWinds' Orion software build system, inserting the SUNBURST backdoor into updates distributed to approximately 18,000 organizations. The malware remained dormant for two weeks after installation before beaconing to attacker-controlled infrastructure. The attack was discovered by FireEye after noticing anomalous activity in their own environment.

Impact Scope: Approximately 18,000 organizations installed the compromised update; confirmed breaches at multiple U.S. government agencies (Treasury, Commerce, Homeland Security, State Department, and others), Microsoft, FireEye, and numerous Fortune 500 companies

Key Lessons:

  • Build system security is as critical as source code security
  • Software signing alone does not guarantee integrity—the build process must be secured
  • Sophisticated attackers target widely-deployed management software for maximum reach
  • Detection of supply chain compromises requires behavioral analysis beyond signature matching
  • Led to Executive Order 14028 mandating SBOM adoption for federal software procurement

Sources:

  • CISA, "Advanced Persistent Threat Compromise of Government Agencies," Alert AA20-352A14
  • FireEye, "Highly Evasive Attacker Leverages SolarWinds Supply Chain," 202015
  • Microsoft, "Analyzing Solorigate," 202016

2021

Codecov Bash Uploader Compromise

Date: April 1, 2021 (disclosed); attack began January 31, 2021

Summary: Attackers exploited a vulnerability in Codecov's Docker image creation process to modify the Bash Uploader script, adding code that exfiltrated environment variables (including CI/CD secrets, API tokens, and credentials) from customer build environments to an attacker-controlled server. The compromise persisted for over two months before detection.

Impact Scope: Approximately 29,000 customers potentially affected; confirmed secondary breaches at Twitch, HashiCorp, and others whose secrets were exfiltrated

Key Lessons:

  • CI/CD environments contain high-value secrets requiring protection
  • Scripts fetched and executed during builds are attack vectors
  • Supply chain attacks can cascade—compromised credentials enable secondary attacks
  • Integrity verification (checksums, signatures) should be mandatory for build-time dependencies

Sources:

  • Codecov, "Bash Uploader Security Update," 202117
  • HashiCorp, "Codecov Security Event Impact," 202118
  • Reuters, "Codecov hackers breached hundreds of networks," 202119

ua-parser-js Hijacking

Date: October 22, 2021

Summary: Attackers compromised the NPM account of the ua-parser-js maintainer and published three malicious versions (0.7.29, 0.8.0, 1.0.0) containing cryptocurrency miners and password-stealing trojans. The package, used for parsing browser user-agent strings, had approximately 8 million weekly downloads. The compromise was detected and removed within hours.

Impact Scope: Approximately 8 million weekly downloads; malicious versions available for approximately 4 hours; CISA issued alert regarding potential federal agency exposure

Key Lessons:

  • High-download packages are attractive targets for account takeover
  • Multi-factor authentication on package registry accounts is essential
  • Rapid detection and response capabilities are critical for package registries
  • Even brief windows of compromise can affect millions of downstream users

Sources:

  • GitHub Advisory GHSA-pjwm-rvh2-c87w20
  • CISA, "MAR-10354752-1.v1," 202121
  • Bleeping Computer, "Popular npm library hijacked," 202122

Log4Shell (CVE-2021-44228)

Date: December 9, 2021 (disclosed)

Summary: A critical remote code execution vulnerability was discovered in Apache Log4j 2, a ubiquitous Java logging library. The flaw allowed attackers to execute arbitrary code by submitting specially crafted strings that triggered JNDI lookups to attacker-controlled servers. Due to Log4j's prevalence across enterprise software, cloud services, and embedded systems, the vulnerability was described as one of the most severe in internet history.

Impact Scope: Estimated hundreds of millions of affected devices; exploited within hours of disclosure; affected services included Apple iCloud, Amazon AWS, Cloudflare, Steam, Minecraft, and countless enterprise applications

Key Lessons:

  • Ubiquitous dependencies create systemic risk across the software ecosystem
  • Many organizations lack visibility into their transitive dependencies
  • Vulnerability disclosure in widely-used libraries requires coordinated response
  • SBOM adoption is essential for rapid vulnerability identification and response
  • Feature-rich libraries may contain unexpected attack surface (JNDI lookup feature)

Sources:

  • Apache Log4j Security Vulnerabilities23
  • CVE-2021-4422824
  • CISA, "Apache Log4j Vulnerability Guidance," 202125
  • Swiss Government NCSC, "Log4j Analysis," 202126

2022

colors.js and faker.js Sabotage (Protestware)

Date: January 8, 2022

Summary: The maintainer of colors.js and faker.js, Marak Squires, deliberately corrupted both packages in protest of large corporations using open source without adequate compensation. The colors.js update introduced an infinite loop printing "LIBERTY LIBERTY LIBERTY" along with ANSI art, while faker.js was emptied entirely. The packages had a combined weekly download count exceeding 25 million.

Impact Scope: Approximately 19,000 projects depended on colors.js; Amazon AWS Cloud Development Kit (CDK) builds were disrupted; faker.js was subsequently forked as @faker-js/faker with new maintainers

Key Lessons:

  • Open source sustainability and maintainer burnout create security risks
  • Single-maintainer projects represent single points of failure
  • Package registries should consider policies for detecting and responding to self-sabotage
  • Dependency pinning and lock files provide protection against malicious updates
  • Community forks can provide continuity when original projects are compromised

Sources:

  • Bleeping Computer, "Dev corrupts npm libs 'colors' and 'faker'," 202227
  • GitHub Issue, colors.js #31728
  • The Verge, "Open source developer corrupts widely-used libraries," 202229

node-ipc Protestware (CVE-2022-23812)

Date: March 15, 2022 (disclosed)

Summary: The maintainer of node-ipc, a popular inter-process communication library, added code that detected Russian and Belarusian IP addresses and overwrote files on affected systems with heart emojis, in protest of Russia's invasion of Ukraine. Earlier versions contained more destructive code. The package had approximately 1 million weekly downloads and was a dependency of the Vue.js CLI.

Impact Scope: Approximately 1 million weekly downloads; Vue.js CLI users potentially affected; systems with Russian or Belarusian IP addresses experienced data destruction

Key Lessons:

  • "Protestware" represents a distinct threat category where trusted maintainers weaponize their access
  • Geopolitical events can motivate software supply chain attacks
  • Even well-intentioned political actions in software cause collateral damage
  • Automated behavioral analysis could detect unexpected file system operations
  • Package registry policies must address intentional sabotage by maintainers

Sources:

  • Snyk, "Protestware: Open Source Malware," 202230
  • CVE-2022-2381231
  • Snyk, "node-ipc protestware analysis," 202232

PyTorch Dependency Confusion (torchtriton)

Date: December 2022

Summary: A malicious PyPI package named torchtriton exploited dependency confusion to target internal PyTorch build systems. The package executed during installation and attempted to exfiltrate environment data.

Impact Scope: Limited external exposure; internal systems targeted

Key Lessons:

  • Dependency confusion remains viable years after disclosure
  • Internal package namespaces require defensive registration
  • ML tooling pipelines are high-value targets

Sources:

  • PyTorch Security Advisory, December 202233
  • Checkmarx, "PyTorch Dependency Confusion," 202334

2023

3CX Supply Chain Attack

Date: March 29, 2023 (disclosed)

Summary: The 3CX desktop application, a voice and video conferencing client used by over 600,000 organizations, was compromised through a cascading supply chain attack. Attackers first compromised X_TRADER, a trading software application from Trading Technologies, then used credentials from a 3CX employee who had installed the compromised X_TRADER to access 3CX's build environment. The attack was attributed to North Korean threat actors (Lazarus Group).

Impact Scope: Approximately 600,000 customer organizations; 12 million daily users; both Windows and macOS versions were compromised; secondary payload targeted cryptocurrency companies

Key Lessons:

  • Supply chain attacks can cascade—one compromise enables the next
  • Employee workstations with development access require heightened security
  • Nation-state actors invest in long-term, multi-stage supply chain operations
  • Build environment isolation and integrity verification are essential
  • Detection requires correlation across multiple vendors and time periods

Sources:

  • CrowdStrike, "3CXDesktopApp Supply Chain Attack," 202335
  • Mandiant, "3CX Supply Chain Compromise," 202336
  • 3CX Security Advisory37

GitHub Dependabot Account Compromise Attempts

Date: Ongoing 2023

Summary: Multiple campaigns attempted to exploit Dependabot PR workflows to introduce malicious dependency updates, relying on automated merging or insufficient review.

Impact Scope: No confirmed large-scale compromise, but repeated near-misses across major repositories

Key Lessons:

  • Automation amplifies both defense and risk
  • Dependency update bots require strict policy controls
  • "Near misses" should be treated as incidents for learning

npm eslint-scope / @eslint Ecosystem Confusion Attempt

Date: Mid-2023

Summary: Attackers attempted to exploit namespace trust around ESLint-related packages using lookalike names and social engineering, though widespread compromise was avoided.

Key Lessons:

  • Trusted namespaces create implicit trust
  • Visual similarity attacks bypass human review
  • Namespace governance is a security control

Ledger Connect Kit Compromise

Date: December 14, 2023

Summary: Attackers compromised a former Ledger employee's NPMJS account through a phishing attack and published malicious versions (1.1.5–1.1.7) of the Ledger Connect Kit, a JavaScript library used by decentralized applications (dApps) to connect to Ledger hardware wallets. The malicious code contained a wallet drainer that redirected cryptocurrency transactions to attacker-controlled addresses.

Impact Scope: Over 100 cryptocurrency projects potentially affected; confirmed losses exceeded $600,000; attack window was approximately 5 hours before detection and takedown

Key Lessons:

  • Former employee accounts should be promptly deactivated
  • Cryptocurrency and financial software are high-value targets
  • NPM account security (MFA, access controls) is critical for sensitive packages
  • Real-time monitoring for package modifications can reduce attack windows
  • End-user impact can be immediate and financially devastating

Sources:

  • Ledger, "Security Incident Report," 202338
  • Blockaid, "Ledger Connect Kit Incident Analysis," 202339
  • CoinDesk, "Ledger Library Compromised," 202340

2024

BIPClip PyPI Campaign

Date: March 12, 2024

Summary: ReversingLabs researchers exposed BIPClip, a malicious PyPI campaign targeting developers working on cryptocurrency wallet projects. The packages posed as open-source libraries to steal BIP39 mnemonic phrases—the recovery passwords used to restore cryptocurrency wallets. The campaign specifically targeted the intersection of cryptocurrency and open source development.

Impact Scope: Developers working on cryptocurrency wallet recovery; potential theft of wallet recovery credentials

Key Lessons:

  • Cryptocurrency developers are high-value targets for supply chain attacks
  • Attackers research specific developer workflows to craft targeted packages
  • Package names may reference legitimate cryptographic standards (BIP39) to appear authentic
  • Code review must scrutinize packages handling sensitive cryptographic material

Sources:

  • Karlo Zanki, "BIPClip: Malicious PyPI packages target crypto wallet recovery passwords," ReversingLabs, March 12, 202441

XZ Utils Backdoor (CVE-2024-3094)

Date: March 29, 2024 (disclosed)

Summary: A sophisticated backdoor was discovered in XZ Utils versions 5.6.0 and 5.6.1, a widely-used compression library included in most Linux distributions. The attacker, operating under the pseudonym "Jia Tan," spent approximately two years building trust within the project before inserting obfuscated malicious code that enabled remote code execution for attackers possessing a specific Ed448 private key. The backdoor specifically targeted OpenSSH servers through systemd integration. The compromise was discovered accidentally by Andres Freund, a Microsoft engineer, who noticed SSH authentication was taking 500ms longer than expected.

Impact Scope: Multiple Linux distributions (Fedora 40/41 Rawhide, Debian testing/unstable, openSUSE Tumbleweed, Arch Linux, Kali Linux) included or nearly included the compromised versions; the backdoor would have provided remote root access to affected systems

Key Lessons:

  • Social engineering attacks against maintainers can span years
  • Open source projects face pressure to accept "helpful" contributors
  • Upstream dependencies in foundational libraries pose systemic risk
  • Performance anomalies can indicate security issues—observability matters
  • Binary artifacts in repositories merit heightened scrutiny
  • Reproducible builds could have detected the discrepancy between source and binary

Sources:

  • Freund, A., "Backdoor in upstream xz/liblzma," oss-security mailing list, 202442
  • CVE-2024-309443
  • CISA Alert, "XZ Utils Backdoor," 202444
  • Arstechnica, "What we know about the xz Utils backdoor," 202445

VS Code Extension Marketplace Malware Campaigns

Date: 2024 (multiple waves)

Summary: Multiple malicious extensions were identified in the Visual Studio Code Marketplace, including extensions that harvested credentials, opened reverse shells, or downloaded second-stage payloads. Some impersonated popular AI or developer tooling extensions.

Impact Scope: Hundreds of thousands of installs before takedown

Key Lessons:

  • IDEs are part of the software supply chain
  • Extension ecosystems mirror package registries in risk profile
  • Developer workstations are high-value targets

GitHub Release Asset Replacement Attacks

Date: 2024

Summary: Researchers identified cases where attackers compromised repositories and replaced GitHub release binaries without modifying source code, exploiting the fact that many users download prebuilt artifacts directly.

Impact Scope: Limited but high-impact for affected projects

Key Lessons:

  • Release artifacts require the same integrity guarantees as source
  • Reproducible builds matter beyond theory
  • "Source available" does not mean "binary trustworthy"

Polyfill.io Supply Chain Attack

Date: June 25, 2024 (disclosed)

Summary: The domain polyfill.io, which provided a popular JavaScript polyfill service used by over 100,000 websites, was sold to a Chinese company (Funnull) that subsequently modified the code to inject malicious redirects and malware. The service had been embedded in websites via CDN script tags, meaning the new owners could serve arbitrary JavaScript to all sites using the service. Google began blocking ads for sites using polyfill.io.

Impact Scope: Over 100,000 websites affected including major sites; Namecheap suspended the domain; Cloudflare and Fastly created automatic redirects to safe mirrors

Key Lessons:

  • Third-party CDN dependencies create single points of compromise
  • Domain/service ownership transfers can weaponize previously trusted resources
  • Self-hosting or using Subresource Integrity (SRI) provides protection
  • Long-term trust relationships with services require ongoing verification
  • CDN providers should implement domain change monitoring

Sources:

  • Sansec, "Polyfill.io supply chain attack," 202446
  • Cloudflare Blog, "Polyfill.io automatic replacement," 202447
  • Google Ads Policy Update, June 202448

Justice AV Solutions (JAVS) Compromise

Date: May 23, 2024 (disclosed); attack began April 2024

Summary: Attackers compromised the Justice AV Solutions video-recording software installer, used in courtrooms, legal offices, correctional facilities, and government agencies worldwide. The attack involved repackaging the legitimate installer with a malicious executable (fffmpeg.exe—a typosquat on the legitimate ffmpeg.exe) containing the RustDoor/GateDoor malware. The malware collected credentials and disabled security measures including AMSI and ETW. The installer was signed with a certificate issued to "Vanguard Tech Limited" rather than JAVS, suggesting attackers compromised distribution infrastructure rather than the build environment.

Impact Scope: Courtrooms, prisons, police stations, and other justice system organizations worldwide; linked to ShadowSyndicate ransomware-as-a-service group

Key Lessons:

  • Commercial software binaries require verification before deployment, not blind trust
  • Typosquatting techniques apply within installers, not just package registries
  • Certificate signing alone is insufficient—the signing entity must be verified
  • Differential analysis can detect tampering indicators before deployment
  • Distribution infrastructure is as critical to secure as build environments

Sources:

  • ReversingLabs, "The 2025 Software Supply Chain Security Report," 202549
  • Rapid7, "CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software," May 202450
  • BleepingComputer, "JAVS courtroom recording software backdoored in supply chain attack," May 202451

Shai Hulud GitHub Actions Campaign

Date: September-November 2025 (disclosed September 18, 2025)

Summary: The Shai Hulud campaign exploited misconfigured GitHub Actions workflows to compromise npm package publishing credentials across major open source projects. Attackers identified repositories using dangerous workflow triggers like pull_request_target and submitted malicious pull requests that executed in the context of the target repository with access to secrets. The campaign targeted high-profile projects including AsyncAPI, PostHog, Postman, Zapier, and ENS Domains.

Impact Scope: Major projects compromised; npm publishing tokens stolen; malicious packages published to npm registry; attacks continued spreading to new organizations hourly during the active campaign period

Key Lessons:

  • GitHub Actions workflow configurations are critical attack surface
  • pull_request_target and workflow_run triggers enable code from forks to access secrets
  • CI/CD misconfigurations can serve as "patient zero" for cascading supply chain attacks
  • Traditional PR-scanning tools failed to detect vulnerable workflow configurations
  • Manual npm package uploads from "codespace" and "runner" usernames indicate CI exploitation
  • Organizations must implement security scanning specifically for CI/CD configurations

Sources:

  • Aikido Security, "Shai Hulud GitHub Actions Incident," 202552
  • Unit 42, "GitHub Actions Supply Chain Attack," 202553

@lottiefiles/lottie-player Malware

Date: November 21, 2024

Summary: Three versions of the npm package @lottiefiles/lottie-player were found infected with malware designed to steal cryptocurrency wallet assets. The package, used for animation playback, was compromised to target users' cryptocurrency holdings.

Impact Scope: Users of Lottie animation library; cryptocurrency wallet theft

Key Lessons:

  • Seemingly unrelated packages (animation libraries) can be weaponized for financial theft
  • Cryptocurrency theft code can be injected into any popular package
  • Version pinning and integrity verification protect against mid-stream compromise

Sources:

  • ReversingLabs, "The 2025 Software Supply Chain Security Report," 202554

aiocpa Legitimate-to-Malicious Package Flip

Date: November 28, 2024 (disclosed)

Summary: ReversingLabs detected malicious code in the Python package aiocpa, which had been originally engineered as a legitimate cryptocurrency payment client. The package attracted a legitimate user base before a subsequent update compromised cryptocurrency wallets using the client. This represents an evolution in attack sophistication—rather than typosquatting or hijacking, attackers invested time creating genuinely useful software to build trust before weaponization.

Impact Scope: Users of the aiocpa cryptocurrency client; cryptocurrency wallet compromise

Key Lessons:

  • Attackers are investing in long-term operations, creating legitimate packages before flipping
  • Package age and functionality do not guarantee safety—ongoing monitoring is essential
  • Cryptocurrency-focused packages warrant heightened scrutiny regardless of apparent legitimacy
  • Behavioral analysis must detect changes in package behavior across versions

Sources:

  • Karlo Zanki, "Malicious PyPI crypto pay package aiocpa implants infostealer code," ReversingLabs, November 28, 202455

@solana/web3.js Compromise

Date: December 5, 2024

Summary: Attackers compromised the npm package @solana/web3.js, a JavaScript API for the Solana blockchain platform, implanting malicious functions in two package versions. The compromise occurred through a stolen maintainer account with publishing privileges. The package ranks among the top 10,000 projects in the npm community with more than 3,000 dependent projects and 400,000 weekly downloads.

Impact Scope: 400,000 weekly downloads; 3,000 dependent projects; Solana blockchain ecosystem

Key Lessons:

  • High-profile packages with extensive dependency chains are priority targets
  • Compromised maintainer credentials enable direct package modification without build system compromise
  • Even packages from well-funded blockchain foundations require continuous monitoring
  • Downstream impact scales with dependency count and download volume

Sources:

  • Paul Roberts, "Malware found in Solana npm library raises the bar for crypto security," ReversingLabs, December 5, 202456

Ultralytics Build Environment Compromise

Date: December 9, 2024

Summary: Attackers compromised the popular AI library Ultralytics by exploiting a previously reported GitHub Actions script injection vulnerability. The attack compromised the build environment and injected malicious code after the code review process completed, resulting in malicious updates pushed to a library with close to 60 million downloads. The injected code downloaded the XMRig cryptocurrency miner.

Impact Scope: Nearly 60 million downloads; AI/ML development community; cryptocurrency mining on compromised systems

Key Lessons:

  • GitHub Actions workflow vulnerabilities can compromise build environments
  • Code review is insufficient when attacks occur after the review stage
  • AI/ML libraries are increasingly targeted supply chain attack vectors
  • Known vulnerabilities in CI/CD configurations require immediate remediation

Sources:

  • Karlo Zanki, "Compromised ultralytics PyPI package delivers crypto coinminer," ReversingLabs, December 9, 202457

rspack and vant Cryptomining Compromise

Date: December 20, 2024

Summary: The npm packages rspack (a Rust-based JavaScript bundler) and vant (a Vue.js mobile UI component library) were compromised with cryptomining malware. The attacks demonstrated continued targeting of developer tools and popular UI frameworks.

Impact Scope: Users of rspack build tool and vant UI framework; cryptomining on affected systems

Key Lessons:

  • Build tools represent high-value targets—they execute in privileged environments
  • UI component frameworks with many dependents amplify attack impact
  • Cryptomining payloads provide attackers immediate monetization

Sources:

  • ReversingLabs, "The 2025 Software Supply Chain Security Report," 202558

PyPI Typosquatting Campaign

Date: Ongoing throughout 2024

Summary: Multiple coordinated campaigns uploaded hundreds of malicious packages to PyPI using typosquatting techniques, targeting popular packages like requests, beautifulsoup4, and tensorflow. These packages contained credential stealers, cryptocurrency miners, and backdoors. While individual packages were removed quickly, the campaigns demonstrated the ongoing challenge of preventing malicious package uploads at scale.

Impact Scope: Hundreds of malicious packages; thousands of downloads before detection; primarily affected developers who mistyped package names during installation

Key Lessons:

  • Typosquatting remains an effective attack vector at scale
  • Automated detection can identify but not prevent all malicious uploads
  • Developer education about verification before installation is essential
  • Package managers should implement proactive typosquatting detection
  • Corporate environments benefit from curated internal package repositories

Sources:

  • Phylum Research, "PyPI Typosquatting," 202459
  • PyPI Security Reports, 202460
  • Checkmarx Supply Chain Security Research, 202461

2025

nullifAI Hugging Face Attack

Date: February 6, 2025

Summary: ReversingLabs researchers discovered a malicious technique dubbed "nullifAI" where attackers placed malicious code in Pickle serialization files while evading protections built into the Hugging Face open-source AI/ML platform. When users loaded the apparently benign ML models, the Pickle format serialization files executed malicious code on their systems. The attack exploited the inherently unsafe nature of Python's Pickle format, which allows embedded code execution during deserialization.

Impact Scope: Users of Hugging Face platform loading malicious ML models; demonstrates broader AI/ML supply chain vulnerability

Key Lessons:

  • Python Pickle files are "inherently unsafe" and require the same scrutiny as executable code
  • AI/ML model distribution represents a distinct supply chain attack surface
  • Platform-level protections can be evaded through format-specific vulnerabilities
  • Serialized ML models must be vetted with the same rigor as software packages

Sources:

  • Karlo Zanki, "Malicious ML models discovered on Hugging Face platform," ReversingLabs, February 6, 202562

IPany VPN Supply Chain Attack

Date: January 22, 2025

Summary: The South Korean VPN client IPany was breached in a supply chain attack that pushed custom malware to users. The compromise demonstrated continued targeting of VPN and security software—products that users trust implicitly and that often run with elevated privileges.

Impact Scope: IPany VPN users in South Korea and globally

Key Lessons:

  • Security software (VPNs, antivirus, endpoint protection) represents high-value supply chain targets
  • Regional software may be targeted for geopolitical or strategic access
  • Commercial security binaries require the same verification as any other software

Sources:

  • Bill Toulas, "IPany VPN breached in supply-chain attack to push custom malware," BleepingComputer, January 22, 202563

GitHub Action tj-actions/changed-files Compromise (CVE-2025-30066)

Date: March 2025

Summary: Attackers exploited a high-severity vulnerability (CVE-2025-30066) to modify the code of the popular tj-actions/changed-files GitHub Action. By updating version tags to reference a malicious commit, the attackers caused CI/CD secrets to be leaked into public build logs across thousands of projects that relied on the action. This attack demonstrated the risks of trusting mutable version tags in GitHub Actions.

Impact Scope: Thousands of projects using the action; CI/CD secrets exposed in public build logs

Key Lessons:

  • GitHub Actions version tags are mutable and can be redirected to malicious commits
  • Organizations should pin GitHub Actions to specific commit SHAs, not version tags
  • CI/CD secrets in build logs represent a significant exposure risk
  • Popular Actions become high-value targets due to their wide adoption

Sources:

  • Silobreaker, "Supply Chain Attacks in 2025: A Month-by-Month Summary," 202564

Erlang/OTP SSH Zero-Day (CVE-2025-32433)

Date: April 2025

Summary: A CVSS 10.0 vulnerability was discovered in the Erlang/OTP SSH daemon, a foundational technology for telecommunications (Ericsson) and messaging (WhatsApp). The flaw allowed for pre-authentication remote code execution, meaning attackers could take full control of a system before any login occurred by sending specially crafted SSH protocol messages. This vulnerability highlighted the systemic risk posed by flaws in foundational libraries that underpin critical infrastructure.

Impact Scope: Telecommunications infrastructure, messaging platforms including WhatsApp, any system using Erlang/OTP SSH daemon

Key Lessons:

  • Foundational libraries in critical infrastructure pose systemic risk when compromised
  • Pre-authentication vulnerabilities are particularly dangerous as they bypass all access controls
  • Telecommunications and messaging infrastructure share common dependencies
  • CVSS 10.0 vulnerabilities in widely-deployed components require emergency response

Sources:

  • Unit 42, "Vulnerability Analysis CVE-2025-32433," 202565

Notepad++ Update Hijacking

Date: June 2025 (infrastructure compromised); July-October 2025 (active infection campaigns); December 2025 (full remediation); February 2026 (disclosure)

Summary: Attackers attributed to the Chinese APT group Lotus Blossom/Spring Dragon (attribution by Kaspersky) compromised the shared hosting provider used by Notepad++ to hijack update traffic. Rather than compromising the build system, attackers intercepted requests to the legitimate update endpoint and selectively redirected targeted victims to malicious update servers while legitimate users received normal updates. The attack employed three distinct infection chains over several months: a ProShow vulnerability exploit delivering Cobalt Strike, Lua interpreter abuse for payload delivery, and DLL sideloading with the Chrysalis backdoor. The selective targeting made detection difficult, and the attack persisted for approximately five months before discovery and remediation.

Impact Scope: Targeted victims including government organizations (Philippines), financial institutions (El Salvador), and IT service providers (Vietnam); approximately a dozen confirmed infections representing a state-sponsored espionage operation—a small number that likely belies significant intelligence value, comparable to how SolarWinds actively exploited roughly 100 of its 18,000 infected organizations

Key Lessons:

  • Infrastructure dependencies (hosting providers, CDNs) are part of the supply chain attack surface
  • Signature verification must confirm the expected publisher, not just certificate validity—Notepad++'s updater (WinGUp) verified that a valid certificate existed but did not verify it belonged to the expected publisher
  • Signed update manifests (e.g., XMLDSig) can prevent tampering even when traffic is redirected, though comprehensive frameworks like TUF69 provide broader protections
  • Selective targeting allows attackers to evade broad security monitoring
  • User reports of unusual network connections (e.g., to temp.sh) can provide early detection signals—organizations should formalize channels for reporting anomalous software behavior

Sources:

  • Kaspersky Securelist, "A Supply Chain Attack on Notepad++," February 2, 202666
  • Notepad++, "Hijacked Incident Info Update," February 2, 202667
  • Notepad++, "v8.8.9 Released," December 9, 202568
  • NVD, CVE-2025-15556 (CWE-494, CVSS 7.5): Missing cryptographic verification in WinGUp updater80
  • CISA KEV catalog: CVE-2025-15556 added February 12, 2026; federal remediation due March 5, 202681

PhantomRaven npm Campaign

Date: August 2025

Summary: The PhantomRaven campaign utilized 126 malicious npm packages to target global developers. Unlike previous "shotgun" approaches, this was a highly targeted campaign designed specifically to steal npm tokens and GitHub credentials to facilitate further supply chain pivots into corporate private repositories. The campaign demonstrated increasing sophistication in how attackers leverage initial compromises to achieve broader access.

Impact Scope: Developers globally; npm tokens and GitHub credentials stolen; potential for cascading attacks into private repositories

Key Lessons:

  • Attackers are shifting from broad attacks to targeted credential harvesting
  • Stolen npm/GitHub tokens enable pivoting into private corporate repositories
  • Supply chain attacks increasingly serve as initial access for deeper compromises
  • Credential rotation and token monitoring are essential defenses

Sources:

  • Socket.dev, "npm Malware Campaign PhantomRaven," 202570

Shai-Hulud npm Worm

Date: September 2025 (initial); November 2025 (Shai-Hulud 2.0)

Summary: Researchers discovered a self-replicating malware campaign dubbed "Shai-Hulud" targeting the npm ecosystem. The attack began with phishing campaigns spoofing npm 2FA update notifications to harvest maintainer credentials. Once attackers gained access to a maintainer account, the worm automatically trojanized that developer's packages by modifying package.json files and republishing them. It successfully compromised over 500 packages in the initial wave, focusing on harvesting GitHub, npm, and AWS secrets from developer environments. This represented a significant evolution in supply chain attacks—from one-off compromises to self-propagating infections.

In November 2025, a second wave dubbed "Shai-Hulud 2.0" emerged with modified tactics, compromising nearly 800 additional packages before containment. The combined attacks directly catalyzed npm's aggressive security overhaul, including the deprecation of TOTP 2FA, mandatory phishing-resistant authentication, and the permanent revocation of all classic tokens.

Impact Scope: Over 1,300 npm packages compromised across both waves; GitHub, npm, and AWS secrets harvested; self-replicating propagation; estimated $50 million in cryptocurrency theft

Key Lessons:

  • Self-replicating supply chain malware can achieve exponential spread
  • Automated republishing of compromised packages accelerates infection
  • Multi-platform credential harvesting (GitHub, npm, AWS) maximizes attacker value
  • Registry-level defenses must detect and prevent automated malicious updates
  • TOTP-based 2FA is vulnerable to real-time phishing; phishing-resistant authentication is essential
  • The attack led directly to major npm security policy changes

Sources:

  • Truesec, "500 npm Packages Compromised in Ongoing Supply Chain Attack Shai-Hulud," 202571
  • CISA, "Widespread Supply Chain Compromise Impacting npm Ecosystem," September 23, 202572
  • Microsoft Security Blog, "Shai-Hulud 2.0 Guidance," December 202573

Josh Junon (Qix) Account Hijack

Date: September 2025

Summary: One of the most high-impact account takeovers in npm history occurred when the account of prominent maintainer Josh Junon (Qix) was compromised. This led to the injection of malicious code into 20+ core packages, including ansi-styles, chalk, and debug, which collectively see over 2 billion weekly downloads. The malware was designed to drain cryptocurrency wallets from developers' machines.

Impact Scope: 20+ core npm packages; over 2 billion weekly downloads affected; cryptocurrency wallet theft

Key Lessons:

  • Single maintainer accounts controlling multiple high-impact packages represent concentrated risk
  • Account security for prolific maintainers requires enterprise-grade protections
  • Cryptocurrency theft remains a primary monetization strategy for supply chain attackers
  • The npm ecosystem's reliance on a small number of maintainers creates systemic vulnerability

Sources:

  • The Hacker News, "20 Popular npm Packages with 2 Billion Weekly Downloads Compromised," September 202574

BoltDB Typosquatting Backdoor

Date: September 2025

Summary: A sophisticated backdoor was discovered in a typosquatted version of the popular BoltDB Go module. The malicious package looked identical to the original but included a hidden routine that established a reverse shell back to the attacker's server upon the first compilation of any project using the module. This attack demonstrated that typosquatting remains effective even in ecosystems with strong naming conventions.

Impact Scope: Go developers using the typosquatted module; reverse shell access to developer machines

Key Lessons:

  • Typosquatting attacks have expanded beyond npm/PyPI to the Go ecosystem
  • Compilation-time execution allows attacks before runtime security controls engage
  • Reverse shells provide attackers persistent, interactive access to developer environments
  • Module verification must occur before compilation, not just at runtime

Sources:

  • CISA, "npm and Go Ecosystem Risks Alert," September 202575

Red Hat GitLab Repository Breach

Date: October 2025

Summary: The "Crimson Collective" threat group claimed responsibility for exfiltrating 570GB of data from over 28,000 internal Red Hat repositories. The breach exposed sensitive infrastructure settings, VPN configurations, and Customer Engagement Reports, highlighting the risks of hosting massive open-source and internal codebases on unified platforms.

Impact Scope (alleged): 28,000+ internal Red Hat repositories; 570GB of data claimed exfiltrated; infrastructure settings, VPN configurations, and customer data reportedly exposed. Independent confirmation of these claims was not publicly available at the time of writing.

Key Lessons:

  • Unified platforms hosting both open-source and internal code present aggregated risk
  • Large-scale repository breaches expose infrastructure configurations alongside code
  • Customer engagement data combined with infrastructure details enables targeted attacks
  • Enterprise GitLab/GitHub instances require segmentation between public and sensitive projects

Sources:

  • Guardz Security Blog, "Top Recent Data Breaches," 202576

Glass Worm (Open VSX Marketplace)

Date: October 2025

Summary: The first major self-propagating infection of the Open VSX Marketplace (an open-source alternative to the VS Code Marketplace) was detected. The "Glass Worm" malware embedded invisible code into VS Code extensions that would infect the user's workspace and attempt to re-upload infected versions of any extension the developer was working on. This demonstrated that IDE extension marketplaces face the same supply chain risks as package registries.

Impact Scope: Open VSX Marketplace users; VS Code extension developers; self-propagating infection of extensions

Key Lessons:

  • IDE extension marketplaces are vulnerable to the same attacks as package registries
  • Self-propagating malware in development tools can spread through the development community
  • Extension developers become unwitting vectors for malware distribution
  • Workspace isolation is essential to prevent cross-contamination of projects

Sources:

  • Veracode, "The First Self-Propagating VS Code Extension Worm: GlassWorm," October 20, 202577
  • Secure Code Warrior, "OWASP Top 10 2025: Software Supply Chain Failures," 202578

Solana Monkey-Patching Malware

Date: 2025

Summary: A cluster of npm packages was found "monkey-patching" (modifying at runtime) the legitimate Solana web3.js library. The malware would wait for a transaction to be signed, then swap the recipient address with the attacker's address or exfiltrate the private key entirely. These packages amassed over 25,000 downloads before being purged. This attack demonstrated sophisticated runtime manipulation rather than simple credential theft.

Impact Scope: Over 25,000 downloads; Solana blockchain users; cryptocurrency theft via transaction manipulation

Key Lessons:

  • Runtime library modification can subvert legitimate code without changing it
  • Transaction interception at signing time bypasses most security controls
  • Cryptocurrency libraries are prime targets for sophisticated financial theft
  • Behavioral analysis must detect unexpected modifications to trusted libraries

Sources:

  • ReversingLabs, "The 2025 Software Supply Chain Security Report," 202579

React2Shell (CVE-2025-55182)

Date: December 2025

Summary: Considered the most critical vulnerability of 2025, a flaw in React Server Components (RSC) allowed unauthenticated remote code execution via insecure deserialization. Because it affected the RSC Flight protocol, standard Next.js applications were vulnerable by default, allowing attackers to execute privileged JavaScript with system-level access. The vulnerability's impact was amplified by React's ubiquity in modern web development.

Impact Scope: Standard Next.js applications using React Server Components; web applications globally

Key Lessons:

  • Framework-level vulnerabilities affect all applications built on that framework
  • Deserialization vulnerabilities remain a critical attack vector in modern frameworks
  • Default-vulnerable configurations maximize attacker impact
  • React/Next.js ecosystem scale means vulnerabilities have global reach

Sources:

  • React.dev, "Critical Security Vulnerability in React Server Components," December 3, 202590
  • NVD, CVE-2025-5518291

2026

AWS CodeBreach: CodeBuild Webhook Filter Bypass

Date: January 15, 2026

Summary: Security researchers at Wiz disclosed a webhook filter misconfiguration in AWS CodeBuild affecting four AWS-managed open-source GitHub repositories (aws-sdk-js-v3, aws-lc, amazon-corretto-crypto-provider, awslabs/open-data-registry). Unanchored regex patterns in webhook actor-ID filters performed substring matches rather than exact matches, enabling an attacker who obtained a GitHub user ID containing a trusted maintainer's ID as a substring to bypass the filter and trigger privileged builds with access to repository secrets. AWS reported no downstream compromise and performed credential rotations and broader audit.

Impact Scope: Four AWS-managed open-source repositories; potential (unrealized) impact on downstream consumers of AWS SDK for JavaScript and other libraries

Key Lessons:

  • Webhook filters are security controls and must use exact-match allowlists, not fragile regex
  • CI/CD build environments are credential-theft surfaces; minimize token scope
  • Audit CI trigger logic periodically as part of security reviews
  • Untrusted PRs should require explicit approval gates before triggering privileged builds

Sources:

  • AWS Security Bulletin 2026-002, January 15, 202682
  • Wiz Research, "CodeBreach: Breaking Out of AWS CodeBuild via Webhook Filter Bypass," January 15, 202683

PyPI Spellchecker Lookalikes (Fileless RAT)

Date: January 23, 2026

Summary: Aikido Security reported a cluster of PyPI packages masquerading as spellchecker utilities that delivered a fileless Python remote access trojan. The malicious setup.py spawned a detached child process that downloaded and executed a RAT entirely in memory, reducing forensic artifacts. The shift from cryptocurrency-only payloads to general-purpose RATs signals that attackers increasingly view developer workstations as high-value foothold targets.

Impact Scope: PyPI ecosystem; developer machines running pip install on the malicious packages; download counts limited/uncertain

Key Lessons:

  • Fileless execution models evade file-based detection and reduce forensic artifacts
  • Attacker ROI is shifting from cryptocurrency theft to general-purpose developer footholds
  • Package installation sandboxing and behavioral monitoring are essential CI/CD controls
  • Verify package identity (download counts, maintainer history, repository links) before installation

Sources:

  • Aikido Security, "Malicious PyPI 'spellchecker' packages deliver fileless Python RAT," January 23, 202684

GlassWorm Open VSX Publisher Credential Compromise (Wave 2)

Date: January 30, 2026

Summary: Socket Security reported that four established Open VSX extensions received malicious updates via compromised publisher credentials, delivering the GlassWorm staged loader. Unlike the October 2025 self-propagating GlassWorm worm, this wave used publisher account compromise (likely leaked tokens) to push targeted malicious updates. The payload used runtime decryption, locale avoidance, and dynamic C2 discovery via Solana transaction memos (EtherHiding-style dead-drop resolver). The second-stage targeted developer credentials: ~/.aws, ~/.ssh, browser passwords, and cryptocurrency wallets.

Impact Scope: Four established Open VSX extensions; users of VSCodium, Eclipse Theia, Gitpod, and other Open VSX-consuming editors; developer credential theft

Key Lessons:

  • Publisher credential compromise can bypass static pre-publication checks
  • Open VSX and VS Code Marketplace have different security models; both require governance
  • Developer credential theft from IDE extensions enables upstream supply-chain attacks
  • The Eclipse Foundation's pre-publish security checks initiative (announced January 28, 2026) was directly catalyzed by this incident

Sources:

  • Socket Security, "GlassWorm Strikes Open VSX," January 30, 202685

Metro4Shell: React Native Metro Server KEV Inclusion

Date: February 5, 2026 (KEV addition); exploitation observed December 2025–January 2026

Summary: CISA added CVE-2025-11953 to the Known Exploited Vulnerabilities catalog. The vulnerability is an OS command injection in the Metro Development Server opened by the React Native Community CLI. Metro binds to all network interfaces by default and exposes an unauthenticated endpoint enabling command execution (fully controlled arguments on Windows). VulnCheck reported exploitation activity beginning in late December 2025. The CVSS 9.8 score and KEV addition make this one of the first developer-tooling vulnerabilities to receive mandatory federal remediation timelines.

Impact Scope: React Native developers with Metro servers exposed beyond localhost; developer workstations and CI runners; KEV remediation due date February 26, 2026

Key Lessons:

  • Developer-only services accidentally exposed to networks are functionally internet-facing services
  • Developer workstations hold signing keys, registry tokens, and cloud credentials—RCE is a supply-chain entry point
  • Default bind behaviors (0.0.0.0) must be overridden with policy, not individual choice
  • KEV now covers developer toolchains, not just production infrastructure

Sources:

  • NVD, CVE-2025-11953 (CVSS 9.8)86
  • CISA KEV catalog, entry for CVE-2025-11953, added February 5, 202687
  • VulnCheck, "Metro4Shell exploitation activity," 202688

dYdX Maintainer Compromise (npm + PyPI)

Date: February 6, 2026

Summary: Attackers compromised the maintainer accounts for legitimate dYdX-related packages on both npm and PyPI, publishing malicious versions that stole cryptocurrency wallet credentials and established remote access tooling. The dual-registry attack doubled the victim surface, and the legitimate package histories enabled trust inheritance—the malicious updates were pulled automatically by CI/CD pipelines and developers running routine dependency updates.

Impact Scope: dYdX ecosystem users on npm and PyPI; cryptocurrency wallet theft; remote access established on developer machines; precise victim count unspecified

Key Lessons:

  • Multi-registry attacks multiply blast radius when maintainers reuse credentials across ecosystems
  • Legitimate-to-malicious flips exploit trust inheritance in established packages
  • Combination of credential theft and RAT deployment suggests interest in persistent developer access
  • Cross-registry credential hygiene (unique, scoped credentials per registry) is essential

Sources:

  • Socket Security research and public reporting, February 6, 202689

OpenClaw Ecosystem Attacks (ClawHavoc / CVE-2026-25253 / Moltbook)

Date: January–February 2026

Summary: A cluster of supply chain attacks targeted OpenClaw (formerly Clawdbot, then Moltbot), an open-source autonomous AI personal assistant that gained over 100,000 GitHub stars within two months of its November 2025 release. The incidents demonstrated that AI agent ecosystems reproduce the full spectrum of package-registry attack patterns at accelerated timescales. Between January 27 and February 2, 2026, the ecosystem experienced four overlapping attack waves:

  • ClawHavoc: Researchers audited all 2,857 skills on ClawHub, OpenClaw's plugin registry, and found 341 malicious entries (335 from a single campaign) delivering infostealers that harvested API keys, cryptocurrency wallet private keys, SSH credentials, and browser passwords.
  • CVE-2026-25253 (CVSS 8.8): A cross-site WebSocket hijacking vulnerability allowed one-click remote code execution. A developer visiting a malicious web page would have their authentication token exfiltrated, granting the attacker full gateway control and command execution. Patched in version 2026.1.29.
  • Fake VS Code extension: A trojan branded "ClawdBot Agent" appeared on the VS Code Marketplace before the legitimate project published an official extension, installing ScreenConnect RAT on victim machines.
  • Moltbook database exposure: Moltbook, an AI-agent social network, suffered a backend misconfiguration exposing emails, private messages, and large volumes of authentication tokens, enabling agent impersonation.

Impact Scope: OpenClaw users globally; developers running OpenClaw with system-level permissions; ClawHub skill ecosystem; Moltbook platform users and connected agents

Key Lessons:

  • AI agent plugin registries ("skills") face the same malicious-package risks as npm/PyPI, but with higher impact due to deep system access
  • Browser-to-agent trust boundaries (WebSocket connections from web pages to local agents) are a novel attack surface requiring explicit origin validation
  • Rapid project renames create ideal conditions for impersonation, typosquatting, and namesquatting across distribution channels
  • Agent-to-agent platforms introduce a new "content supply chain" where compromised tokens enable upstream influence on other agents' behavior
  • The speed of attack (341 malicious skills within one week of viral adoption) outpaced governance: agent platform providers should pre-deploy automated skill scanning and allowlisting before opening plugin registries to public submissions

Sources:

  • Koi Security, "ClawHavoc: 341 Malicious Clawed Skills Found by the Bot They Were Targeting," February 2, 202692
  • BleepingComputer, "Malicious MoltBot skills used to push password-stealing malware," 202693
  • The Hacker News, "OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link," February 202694
  • Aikido Security, "Fake Clawdbot VS Code Extension Installs ScreenConnect RAT," January 202695
  • Reuters, "'Moltbook' social media site for AI agents had big security hole, cyber firm Wiz says," February 2, 202696

Summary of Attack Vectors by Incident

Incident Year Primary Vector Sophistication
Trusting Trust 1984 Compiler compromise High
Debian OpenSSL 2008 Maintainer error Low (unintentional)
Heartbleed 2014 Code vulnerability Low (unintentional)
left-pad 2016 Package removal Low
event-stream 2018 Social engineering / maintainer transfer Medium
SolarWinds 2020 Build system compromise Very High
Codecov 2021 CI/CD script compromise Medium
ua-parser-js 2021 Account takeover Medium
Log4Shell 2021 Code vulnerability Low (unintentional)
colors.js/faker.js 2022 Maintainer sabotage Low
node-ipc 2022 Maintainer sabotage Low
3CX 2023 Cascading supply chain Very High
Ledger Connect 2023 Account takeover Medium
BIPClip 2024 Malicious PyPI packages Medium
XZ Utils 2024 Long-term social engineering Very High
JAVS 2024 Distribution infrastructure compromise High
Polyfill.io 2024 Domain acquisition Medium
Shai Hulud (GitHub Actions) 2025 CI/CD workflow exploitation High
@lottiefiles/lottie-player 2024 Account takeover Medium
aiocpa 2024 Legitimate-to-malicious flip High
@solana/web3.js 2024 Account takeover Medium
Ultralytics 2024 CI/CD workflow exploitation High
rspack/vant 2024 Account takeover Medium
IPany VPN 2025 Distribution infrastructure compromise Medium
nullifAI (Hugging Face) 2025 Malicious ML models Medium
tj-actions/changed-files 2025 CI/CD workflow exploitation High
Erlang/OTP SSH 2025 Code vulnerability Low (unintentional)
Notepad++ Update Hijacking 2025 Distribution infrastructure compromise / selective targeting High
PhantomRaven 2025 Malicious npm packages Medium
Shai-Hulud npm Worm (1.0 & 2.0) 2025 Self-replicating malware + phishing Very High
Josh Junon (Qix) 2025 Account takeover High
BoltDB 2025 Typosquatting Medium
Red Hat GitLab 2025 Repository breach High
Glass Worm 2025 Self-replicating malware High
Solana Monkey-Patching 2025 Runtime library manipulation High
React2Shell 2025 Code vulnerability Low (unintentional)
AWS CodeBreach 2026 CI/CD webhook filter bypass High
PyPI Spellchecker RAT 2026 Typosquatting / fileless RAT Medium
Glass Worm (Wave 2) 2026 Publisher credential compromise High
Metro4Shell (KEV) 2026 Developer tooling exploitation Critical
dYdX 2026 Multi-registry maintainer compromise High
OpenClaw Ecosystem 2026 Multi-vector (malicious skills, RCE, impersonation) High

Key Observations Across Incidents

Evolution of Sophistication: Early incidents were primarily accidental vulnerabilities or simple attacks. Modern supply chain attacks increasingly involve long-term planning, social engineering, and targeting of build infrastructure rather than just source code.

Recurring Themes:

  1. Single points of failure: Individual maintainers, accounts, and dependencies create concentrated risk
  2. Trust exploitation: Attackers invest in building trust before exploiting it
  3. Detection challenges: Many compromises persist for weeks or months before discovery
  4. Cascading effects: One compromise enables subsequent attacks downstream

Defensive Gaps Highlighted:

  • Build system integrity verification
  • Distribution infrastructure and update mechanism verification
  • Expected-publisher certificate validation (not just signature existence)
  • Maintainer succession and vetting processes
  • Behavioral analysis of package changes
  • SBOM adoption and dependency visibility
  • Multi-factor authentication enforcement

These incidents collectively demonstrate that software supply chain security requires defense in depth across the entire lifecycle—from initial development through build, publication, distribution, and consumption.


  1. Thompson, K., "Reflections on Trusting Trust," Communications of the ACM, 1984, https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf 

  2. Debian, "Debian Security Advisory DSA-1571-1," 2008, https://www.debian.org/security/2008/dsa-1571 

  3. NIST, "CVE-2008-0166," https://nvd.nist.gov/vuln/detail/CVE-2008-0166 

  4. Schneier, B., "Random Number Bug in Debian Linux," 2008, https://www.schneier.com/blog/archives/2008/05/random_number_b.html 

  5. Heartbleed.com, "Heartbleed Bug," 2014, https://heartbleed.com/ 

  6. NIST, "CVE-2014-0160," https://nvd.nist.gov/vuln/detail/CVE-2014-0160 

  7. Durumeric, Z., et al., "The Matter of Heartbleed," IMC 2014, https://jhalderm.com/pub/papers/heartbleed-imc14.pdf 

  8. Koculu, A., "I've Just Liberated My Modules," 2016, https://kodfabrik.com/journal/i-ve-just-liberated-my-modules 

  9. Williams, C., "How one developer just broke Node, Babel and thousands of projects," The Register, 2016, https://www.theregister.com/2016/03/23/npm_left_pad_chaos/ 

  10. NPM Blog, "kik, left-pad, and npm," 2016, https://blog.npmjs.org/post/141577284765/kik-left-pad-and-npm 

  11. GitHub, "Issue #116: I don't know what to say," dominictarr/event-stream, 2018, https://github.com/dominictarr/event-stream/issues/116 

  12. Snyk, "Malicious code found in npm package event-stream," 2018, https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/ 

  13. NPM, "Security Advisory 737," 2018, https://www.npmjs.com/advisories/737 

  14. CISA, "Advanced Persistent Threat Compromise of Government Agencies," Alert AA20-352A, 2020, https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a 

  15. FireEye/Mandiant, "Highly Evasive Attacker Leverages SolarWinds Supply Chain," 2020, https://www.mandiant.com/resources/blog/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor 

  16. Microsoft, "Analyzing Solorigate," 2020, https://www.microsoft.com/en-us/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/ 

  17. Codecov, "Bash Uploader Security Update," 2021, https://about.codecov.io/security-update/ 

  18. HashiCorp, "Codecov Security Event Impact," 2021, https://discuss.hashicorp.com/t/hcsec-2021-12-codecov-security-event-and-hashicorp-gpg-key-exposure/23512 

  19. Reuters, "Codecov hackers breached hundreds of networks," 2021, https://www.reuters.com/technology/codecov-hackers-breached-hundreds-restricted-customer-sites-sources-2021-04-19/ 

  20. GitHub, "Advisory GHSA-pjwm-rvh2-c87w," 2021, https://github.com/advisories/GHSA-pjwm-rvh2-c87w 

  21. CISA, "MAR-10354752-1.v1," 2021, https://www.cisa.gov/news-events/alerts/2021/10/22/malware-discovered-popular-npm-package-ua-parser-js 

  22. Bleeping Computer, "Popular npm library hijacked," 2021, https://www.bleepingcomputer.com/news/security/popular-npm-library-hijacked-to-install-password-stealers-miners/ 

  23. Apache, "Log4j Security Vulnerabilities," https://logging.apache.org/log4j/2.x/security.html 

  24. NIST, "CVE-2021-44228," https://nvd.nist.gov/vuln/detail/CVE-2021-44228 

  25. CISA, "Apache Log4j Vulnerability Guidance," 2021, https://www.cisa.gov/news-events/news/apache-log4j-vulnerability-guidance 

  26. Swiss Government NCSC, "Log4j Analysis," 2021, https://www.ncsc.admin.ch/ncsc/en/home/aktuell/im-fokus/log4j.html 

  27. Bleeping Computer, "Dev corrupts npm libs 'colors' and 'faker'," 2022, https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/ 

  28. GitHub, "Issue #317," Marak/colors.js, 2022, https://github.com/Marak/colors.js/issues/317 

  29. The Verge, "Open source developer corrupts widely-used libraries," 2022, https://www.theverge.com/2022/1/9/22874949/developer-corrupts-open-source-libraries-colors-faker-protest 

  30. Snyk, "Protestware: Open Source Malware," 2022, https://snyk.io/blog/peacenotwar-malicious-npm-node-ipc-package-vulnerability/ 

  31. NIST, "CVE-2022-23812," https://nvd.nist.gov/vuln/detail/CVE-2022-23812 

  32. Snyk, "node-ipc protestware analysis," 2022, https://snyk.io/blog/peacenotwar-malicious-npm-node-ipc-package-vulnerability/ 

  33. PyTorch, "Security Advisory," December 2022, https://pytorch.org/blog/compromised-nightly-dependency/ 

  34. Checkmarx, "PyTorch Dependency Confusion," 2023, https://medium.com/checkmarx-security/py-torch-a-leading-ml-framework-was-poisoned-with-malicious-dependency-e30f88242964 

  35. CrowdStrike, "3CXDesktopApp Supply Chain Attack," 2023, https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/ 

  36. Mandiant, "3CX Supply Chain Compromise," 2023, https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise 

  37. 3CX, "Security Advisory," 2023, https://www.3cx.com/blog/news/security-incident-updates/ 

  38. Ledger, "Security Incident Report," 2023, https://www.ledger.com/blog/a-letter-from-ledger-chairman-ceo-pascal-gauthier-regarding-ledger-connect-kit-exploit 

  39. Blockaid, "Ledger Connect Kit Incident Analysis," 2023, https://www.blockaid.io/blog/attack-report-ledger-connect-kit 

  40. CoinDesk, "Ledger Library Compromised," 2023, https://www.coindesk.com/tech/2023/12/14/ledgers-connect-kit-compromised-users-warned-not-to-interact-with-dapps/ 

  41. Karlo Zanki, "BIPClip: Malicious PyPI packages target crypto wallet recovery passwords," ReversingLabs, March 12, 2024, https://www.reversinglabs.com/blog/bipclip-malicious-pypi-packages-target-crypto-wallet-recovery-passwords 

  42. Freund, A., "Backdoor in upstream xz/liblzma," oss-security mailing list, 2024, https://www.openwall.com/lists/oss-security/2024/03/29/4 

  43. NIST, "CVE-2024-3094," https://nvd.nist.gov/vuln/detail/CVE-2024-3094 

  44. CISA, "XZ Utils Backdoor Alert," 2024, https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 

  45. Arstechnica, "What we know about the xz Utils backdoor," 2024, https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/ 

  46. Sansec, "Polyfill.io supply chain attack," 2024, https://sansec.io/research/polyfill-supply-chain-attack 

  47. Cloudflare Blog, "Polyfill.io automatic replacement," 2024, https://blog.cloudflare.com/automatically-replacing-polyfill-io-links-with-cloudflares-mirror-for-a-safer-internet/ 

  48. Google, "Ads Policy Update," June 2024, https://support.google.com/adspolicy/answer/14632116 

  49. ReversingLabs, "The 2025 Software Supply Chain Security Report," 2025, https://www.reversinglabs.com/sscs-report 

  50. Rapid7, "CVE-2024-4978: Backdoored Justice AV Solutions Viewer Software," May 2024, https://www.rapid7.com/blog/post/2024/05/30/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack/ 

  51. BleepingComputer, "JAVS courtroom recording software backdoored in supply chain attack," May 2024, https://www.bleepingcomputer.com/news/security/javs-courtroom-recording-software-backdoored-in-supply-chain-attack/ 

  52. Aikido Security, "Shai Hulud GitHub Actions Incident," November 25, 2025, https://www.aikido.dev/blog/github-actions-incident-shai-hulud-supply-chain-attack 

  53. Unit 42, "GitHub Actions Supply Chain Attack," 2025, https://unit42.paloaltonetworks.com/github-actions-supply-chain-attack/ 

  54. ReversingLabs, "The 2025 Software Supply Chain Security Report," 2025, https://www.reversinglabs.com/sscs-report 

  55. Karlo Zanki, "Malicious PyPI crypto pay package aiocpa implants infostealer code," ReversingLabs, November 28, 2024, https://www.reversinglabs.com/blog/malicious-pypi-crypto-pay-package-aiocpa-implants-infostealer-code 

  56. Paul Roberts, "Malware found in Solana npm library raises the bar for crypto security," ReversingLabs, December 5, 2024, https://www.reversinglabs.com/blog/malware-found-in-solana-npm-library-raises-the-bar-for-crypto-security 

  57. Karlo Zanki, "Compromised ultralytics PyPI package delivers crypto coinminer," ReversingLabs, December 9, 2024, https://www.reversinglabs.com/blog/compromised-ultralytics-pypi-package-delivers-crypto-coinminer 

  58. ReversingLabs, "The 2025 Software Supply Chain Security Report," 2025, https://www.reversinglabs.com/sscs-report 

  59. Phylum Research, "PyPI Typosquatting," 2024, https://blog.phylum.io/ 

  60. PyPI, "Security Reports," 2024, https://pypi.org/security/ 

  61. Checkmarx, "Supply Chain Security Research," 2024, https://checkmarx.com/blog/ 

  62. Karlo Zanki, "Malicious ML models discovered on Hugging Face platform," ReversingLabs, February 6, 2025, https://www.reversinglabs.com/blog/malicious-ml-models-discovered-on-hugging-face-platform 

  63. Bill Toulas, "IPany VPN breached in supply-chain attack to push custom malware," BleepingComputer, January 22, 2025, https://www.bleepingcomputer.com/news/security/ipany-vpn-breached-in-supply-chain-attack-to-push-custom-malware/ 

  64. Silobreaker, "Supply Chain Attacks in 2025: A Month-by-Month Summary," 2025, https://www.silobreaker.com/blog/cyber-threats/supply-chain-attacks-in-2025-a-month-by-month-summary/ 

  65. Unit 42, "Vulnerability Analysis CVE-2025-32433," 2025, https://unit42.paloaltonetworks.com/vulnerability-analysis-cve-2025-32433/ 

  66. Kaspersky Securelist, "A Supply Chain Attack on Notepad++," February 2, 2026, https://securelist.com/notepad-supply-chain-attack/118708/ 

  67. Notepad++, "Hijacked Incident Info Update," February 2, 2026, https://notepad-plus-plus.org/news/hijacked-incident-info-update/ 

  68. Notepad++, "v8.8.9 Released," December 9, 2025, https://notepad-plus-plus.org/news/v889-released/ 

  69. The Update Framework (TUF), https://theupdateframework.io/ 

  70. Socket.dev, "npm Malware Campaign PhantomRaven," 2025, https://socket.dev/blog/npm-malware-campaign-phantomraven 

  71. Truesec, "500 npm Packages Compromised in Ongoing Supply Chain Attack Shai-Hulud," 2025, https://www.truesec.com/hub/blog/500-npm-packages-compromised-in-ongoing-supply-chain-attack-shai-hulud 

  72. CISA, "Widespread Supply Chain Compromise Impacting npm Ecosystem," September 23, 2025, https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem 

  73. Microsoft Security Blog, "Shai-Hulud 2.0 Guidance," December 2025, https://www.microsoft.com/en-us/security/blog/2025/12/09/shai-hulud-2-0-guidance-for-detecting-investigating-and-defending-against-the-supply-chain-attack/ 

  74. The Hacker News, "20 Popular npm Packages with 2 Billion Weekly Downloads Compromised," September 2025, https://thehackernews.com/2025/09/20-popular-npm-packages-with-2-billion.html 

  75. CISA, "npm and Go Ecosystem Risks Alert," September 2025, https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem 

  76. Guardz Security Blog, "Top Recent Data Breaches," 2025, https://guardz.com/blog/top-recent-data-breaches/ 

  77. Veracode, "The First Self-Propagating VS Code Extension Worm: GlassWorm," October 20, 2025, https://www.veracode.com/blog/glassworm-vs-code-extension/ 

  78. Secure Code Warrior, "OWASP Top 10 2025: Software Supply Chain Failures," 2025, https://www.securecodewarrior.com/article/owasp-top-10-2025-software-supply-chain-failures 

  79. ReversingLabs, "The 2025 Software Supply Chain Security Report," 2025, https://www.reversinglabs.com/sscs-report 

  80. NIST, "CVE-2025-15556," NVD, https://nvd.nist.gov/vuln/detail/CVE-2025-15556 

  81. CISA, Known Exploited Vulnerabilities Catalog, entry for CVE-2025-15556, added February 12, 2026, https://www.cisa.gov/known-exploited-vulnerabilities-catalog 

  82. AWS, "Security Bulletin 2026-002: Unanchored ACCOUNT_ID webhook filters for CodeBuild," https://aws.amazon.com/security/security-bulletins/2026-002-AWS/, January 15, 2026. 

  83. Wiz Research, "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild," https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild, January 15, 2026. 

  84. Aikido Security, "Malicious PyPI 'spellchecker' packages deliver fileless Python RAT," https://www.aikido.dev/blog/malicious-pypi-packages-spellcheckpy-and-spellcheckerpy-deliver-python-rat, January 23, 2026. 

  85. Socket Security, "GlassWorm Loader Hits Open VSX via Developer Account Compromise," January 31, 2026, https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise 

  86. NIST, "CVE-2025-11953," NVD, https://nvd.nist.gov/vuln/detail/CVE-2025-11953 

  87. CISA, Known Exploited Vulnerabilities Catalog, entry for CVE-2025-11953, added February 5, 2026. 

  88. VulnCheck, "Metro4Shell: Exploitation of React Native’s Metro Server in the Wild," https://www.vulncheck.com/blog/metro4shell_eitw, February 3, 2026. 

  89. Socket Security research and public reporting on dYdX package compromise, https://socket.dev/blog/malicious-dydx-packages-published-to-npm-and-pypi, February 6, 2026. 

  90. React.dev, "Critical Security Vulnerability in React Server Components," December 3, 2025, https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components 

  91. NIST, "CVE-2025-55182," https://nvd.nist.gov/vuln/detail/CVE-2025-55182 

  92. Koi Security, "ClawHavoc: 341 Malicious Clawed Skills Found by the Bot They Were Targeting," February 2, 2026, https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting 

  93. BleepingComputer, "Malicious MoltBot skills used to push password-stealing malware," 2026, https://www.bleepingcomputer.com/news/security/malicious-moltbot-skills-used-to-push-password-stealing-malware/ 

  94. The Hacker News, "OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link," February 2026, https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html 

  95. Aikido Security, "Fake Clawdbot VS Code Extension Installs ScreenConnect RAT," January 2026, https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware 

  96. Reuters, "'Moltbook' social media site for AI agents had big security hole, cyber firm Wiz says," February 2, 2026, https://www.reuters.com/legal/litigation/moltbook-social-media-site-ai-agents-had-big-security-hole-cyber-firm-wiz-says-2026-02-02/