Skip to content

Malicious takeover of Npm package leads to data and cryptocurrency theft facilitated by artificial intelligence-driven malware

AI-led assault on Nx's software supply chain reportedly marks the initial instance of malefactors exploiting developer AI assistants, as per StepSecurity's statements.

Malicious Takeover of Npm Package Leads to Data and Cryptocurrency Theft through Artificial...
Malicious Takeover of Npm Package Leads to Data and Cryptocurrency Theft through Artificial Intelligence-Driven Malware

Malicious takeover of Npm package leads to data and cryptocurrency theft facilitated by artificial intelligence-driven malware

The tech world has been shaken by a recent cyber attack targeting the popular open-source build platform, Nx. The attack, which began on August 26, saw the release of version 21.5.0 of Nx, a platform used by developers to automate and streamline code testing, building, and deployment workflows.

The malicious updates, which also infected seven other versions of Nx released over the next hours and day, were intended to steal cryptocurrencies and key developer data. The attack disproportionately targets GitHub CLI OAuth tokens, but the threat actor also went after GitHub and npm tokens, SSH keys, environment variable secrets, and cryptocurrency wallet data.

The attack follows a two-stage approach. First, private repositories are renamed and converted to public access, then forked into compromised user accounts. The script abused the GitHub API to create a new public repository under the victim's own account for the exfiltrated files.

Thousands of such repositories have now surfaced on GitHub, raising concerns among the developer community. For those impacted, the recommended steps are: making exposed organization repositories private again, disconnecting affected users, revoking all access tokens, and deleting forked repositories.

The malware changed the user's shell configuration files to ensure the machine would reboot every time a new terminal session started, adding an extra layer of complexity to the remediation process.

StepSecurity has provided a comprehensive remediation plan for users to follow. However, a second wave of attacks has been warned, stemming from the Nx credential leaks. The search results do not contain any information about the person or organization behind the second attack on GitHub CLI OAuth tokens related to the Nx leak from August 28, 2022.

In an effort to check if you or your organization have been affected, you can use this GitHub query: https://github.com/search?q=is%3Aname+s1ngularity-repository+org%3Aacme&type=repositories&s=updated&o=desc

It's a critical time for developers to prioritise security measures and stay vigilant against such attacks. As the tech landscape continues to evolve, so too will the tactics of cyber criminals. It's essential to stay informed and take proactive steps to protect valuable data and assets.

Read also: