Exploitation of Cisco Catalyst SD-WAN Vulnerabilities (CVE-2026-20182)

Multiple critical authentication bypass vulnerabilities in Cisco Catalyst SD-WAN Controller and Manager are under active exploitation by various threat clusters, including CVE-2026-20182 (CVSSv3 10.0), which has been exploited as a zero-day by a sophisticated threat actor designated UAT-8616 since at least 2023. This campaign also involves CVE-2026-20127 (CVSSv3 10.0), another critical authentication bypass, and a chain of vulnerabilities comprising CVE-2026-20133 (information disclosure, CVSSv3 7.5), CVE-2026-20128 (credential access, CVSSv3 7.5), and CVE-2026-20122 (arbitrary file overwrite, CVSSv3 5.4), which are exploited by 10 additional threat clusters following the release of public proof-of-concept code. Successful exploitation of the critical authentication bypasses grants privileged access to internal accounts on the SD-WAN Controller, enabling attackers to alter network configurations across the entire SD-WAN fabric, with UAT-8616 further leveraging CVE-2022-20775 (CLI path traversal privilege escalation, CVSSv3 7.8) via software downgrades to achieve root privileges, followed by SSH key injection, malicious account creation, and extensive log clearing. All Cisco Catalyst SD-WAN Controller, Manager, and various SD-WAN Software components are affected, irrespective of configuration or deployment model. Cisco has released patches for all identified vulnerabilities, and the Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 26-03, mandating remediation by May 17 and adding all associated CVEs to its Known Exploited Vulnerabilities catalog. Indicators of Compromise include specific log entries for unauthorized public key authentication, control connection anomalies, and post-compromise artifacts such as unauthorized SSH keys or enabled root login.

Severity: Critical

Threat Details and IOCs

Malware: AdaptixC2, Behinder, Bīng xiē, Godzilla, Ice Scorpion, Nimplant, Rebeyond, Sliver, XenShell, XMRig
CVEs: CVE-2022-20775, CVE-2026-20122, CVE-2026-20127, CVE-2026-20128, CVE-2026-20133, CVE-2026-20182
Technologies: Cisco Catalyst SD-WAN, Linux
Threat Actors: UAT-8616, UAT8616
Attacker Countries: China
Attacker IPs: 104[.]233[.]156[.]1, 104[.]233[.]156[.]11, 104[.]233[.]156[.]119, 1[.]1[.]1[.]10, 13[.]62[.]52[.]206, 176[.]65[.]139[.]31, 194[.]163[.]175[.]135, 212[.]83[.]162[.]37, 2[.]2[.]2[.]2, 23[.]27[.]143[.]170, 38[.]181[.]52[.]89, 38[.]60[.]214[.]92, 47[.]104[.]248[.]7, 65[.]20[.]67[.]134, 71[.]80[.]85[.]135, 79[.]135[.]105[.]208, 83[.]229[.]126[.]195, 89[.]125[.]244[.]33, 89[.]125[.]244[.]51, 94[.]233[.]100[.]40
Attacker Domains: 1a820b09-95ba-44eb-b350-417e8241b725-00-1lgwuuen9b77p[.]worf[.]replit[.]dev, a820b09-95ba-44eb-b350-417e8241b725-00-1lgwuuen9b77p[.]worf[.]replit[.]dev, replit[.]dev
Attacker URLs: hxxp[:]//13.62.52.206:5004, hxxp[:]//83.229.126.195:8081/config.json, hxxp[:]//83.229.126.195:8081/xmrig, hxxps[:]//1a820b09-95ba-44eb-b350-417e8241b725-00-1lgwuuen9b77p.worf.replit.dev/download, mtls[:]//23.27.143.170:443
Attacker Hashes: 02654acfb21f83485393ba8b14bd8862b919b9ec966fc6768f6aac1338a45ee8, 0c87871642f84e09e8d3fb23ec36bf55601323e31151a7017a85dbec929cf15d, 0ed72d52347bfe4a78afff8a6982a64050c8fc86d8957a20eeb3e0f3f5342ed0, 17302d903baf182f94dc3be40ab1e0874dd0eb2ec5255bf9131fd53591efe925, 18d77c9c5bbb5b9d5bdfd366fdfcf26bad9e64c63ca865fad711bcce8e3d5a80, 5bc5998161056b7c8f70c9724d8a63abc7ff8c3843b91c30cffab0899e39b7f8, 72f570ce97de3eaaffef33d90b0c337a153fc9690cc34ee207b557d868360060, 7aa88a64a527ade7d93c20faf23b54f2ee33ad9b1246cdc2f8ded2ab639affb1, 96fc528ca5e7d1c2b3add5e31b8797cb126f704976c8fbeaecdbf0aa4309ad46, b0f51b098842cd630097b462aab0ec357e2c7824af37cca6d08165265da2c2d3, d94f75a70b5cabaf786ac57177ed841732e62bdcc9a29e06e5b41d9be567bcfa, f6f8e0d790645395188fc521039385b7c4f42fa8b426fd035f489f6cda9b5da1
Victim Industries: Cloud Infrastructure, Financial Services, Government, Healthcare, Industrial Sector, IT and DevOps, Manufacturing, Telecommunications, Utilities
Victim Countries: Australia, Canada, New Zealand, United Kingdom, United States

Mitigation Advice

  • Immediately apply the security patches released by Cisco for all vulnerable Catalyst SD-WAN Controller and Manager devices, prioritizing CVE-2026-20182 and CVE-2026-20127.
  • Run an authenticated vulnerability scan across the network to identify all devices affected by the Cisco SD-WAN vulnerabilities (CVE-2026-20182, CVE-2026-20127, CVE-2026-20133, CVE-2026-20128, CVE-2026-20122, CVE-2022-20775).
  • On all Cisco SD-WAN Manager devices, search authentication logs in `/var/log/auth.log` for 'Accepted publickey for vmanage-admin' entries originating from unknown IP addresses.
  • Execute the `show control connections detail` and `show control connections-history detail` commands on Cisco SD-WAN controllers and investigate any connections that have a state of 'up' and a 'challenge-ack' value of 0.
  • Inspect the `/home/vmanage-admin/.ssh/authorized_keys` file for unauthorized SSH keys and the `/etc/ssh/sshd_config` file for the `PermitRootLogin` directive on all Cisco SD-WAN devices.
  • Obtain the latest Indicators of Compromise (IP addresses, file hashes) from the Cisco Talos blog and add them to your firewall blocklists, SIEM alert rules, and EDR watchlists.
  • Use an Attack Surface Management (ASM) tool to discover all internet-facing Cisco Catalyst SD-WAN devices and prioritize them for patching and investigation.

Compliance Best Practices

  • Implement strict firewall rules and access control lists (ACLs) to restrict all access to Cisco SD-WAN management interfaces to a limited set of authorized administrative workstations or jump boxes.
  • Configure all Cisco SD-WAN devices to forward logs to a centralized, write-protected SIEM to ensure a durable audit trail for monitoring and forensic investigation.
  • Deploy a configuration monitoring system to track and alert on unauthorized changes to the configuration of network devices, including SSH settings, user accounts, and software versions.
  • Establish a formal patch management policy for network infrastructure that defines risk-based timelines for testing and deploying critical security updates to minimize the window of exposure.
  • Conduct a periodic audit of all user accounts and associated privileges on Cisco SD-WAN infrastructure, ensuring the principle of least privilege is enforced and removing any unnecessary or dormant accounts.

Exploited Exchange Server Flaw Turns OWA Inboxes Into Script Launchpads

A critical spoofing vulnerability, CVE-2026-42897, has been confirmed in on-premises Exchange Server versions 2016, 2019, and Subscription Edition, affecting Outlook Web Access (OWA). This cross-site scripting flaw, with a CVSS score of 8.1, allows arbitrary JavaScript execution in a user's browser context when a specially crafted email is opened in OWA, and it is currently being exploited. Microsoft has released a mitigation via the Exchange Emergency Mitigation (EM) Service, which can also be applied manually, though it may cause issues with inline images, OWA Print Calendar functionality, and OWA Light. A full security update is under development; however, only Exchange SE will receive a public patch, while Exchange 2016 and 2019 users must be enrolled in Period 2 of the Extended Security Updates (ESU) program to receive it. Exchange Online is not impacted by this vulnerability.

Severity: Critical

Threat Details and IOCs

Malware: Mini Shai-Hulud, Shai-Hulud, Shai-Hulud 2.0
CVEs: CVE-2026-42897
Technologies: Microsoft Exchange Health Checker, Microsoft Exchange Server, Microsoft Internet Information Services, Microsoft Windows Server
Attacker URLs: hxxps[://]aka[.]ms/ExchangeHealthChecker, hxxps[://]aka[.]ms/UnifiedEOMT, hxxps[://]github[.]com/atiilla/CVE-2026-42897
Victim Industries: Aerospace, Agriculture, Biotechnology, Construction, Defense, Education, Financial Services, Government, Healthcare, Insurance, Legal Services, Manufacturing, Military, Oil & Gas, Pharmaceuticals, Professional Services, Real Estate, Retail, Software, Technology Hardware, Transportation, Utilities
Victim Countries: France, Germany, United States

Mitigation Advice

  • Enable and verify the Exchange Emergency Mitigation (EM) Service on all on-premises Exchange Servers to automatically apply the mitigation for CVE-2026-42897.
  • For Exchange servers in disconnected or air-gapped environments, manually apply the mitigation for CVE-2026-42897 as described by Microsoft.
  • Inform users via company-wide communication that after an emergency security update, inline images and the print calendar function in Outlook Web Access (OWA) may be temporarily unavailable, and provide suggested workarounds like using the Outlook Desktop client.
  • Review Exchange Server and web server logs for signs of unusual activity or patterns indicative of cross-site scripting attacks against Outlook Web Access (OWA).

Compliance Best Practices

  • Develop a project plan and budget to migrate from on-premises Exchange Server to Exchange Online (Microsoft 365).
  • If running Exchange Server 2016 or 2019, ensure the organization is enrolled in the Exchange Server Extended Security Updates (ESU) program to continue receiving critical security patches.
  • Establish and enforce a technology lifecycle management policy to identify and replace software and features that reach end-of-life or are deprecated, such as OWA Light.
  • Deploy and configure a Web Application Firewall (WAF) to protect all public-facing web services, including Outlook Web Access, with rulesets designed to block cross-site scripting attacks.

The 4th Linux Kernel Flaw This Month Can Lead to Stolen SSH Host Keys

A critical information-disclosure vulnerability, identified as CVE-2026-46333 and nicknamed "ssh-keysign-pwn," has been discovered in the Linux kernel's `ptrace` access check, specifically within the `__ptrace_may_access()` logic. This flaw, present for approximately six years and affecting all Linux kernels released before May 14, 2026, allows unprivileged users to exploit a brief window during process exit to steal file descriptors from privileged processes, notably by abusing OpenSSH's `ssh-keysign` helper binary and the `pidfd_getfd(2)` system call. Successful exploitation enables the quiet reading of sensitive files such as Secure Shell (SSH) host private keys and the shadow password file, facilitating lateral movement, system impersonation, and offline password cracking. A patch has been released by Linus Torvalds and integrated into stable kernel branches, including versions 7.0.8, 6.18.31, 6.12.89, 6.6.139, 6.1.173, 5.15.207, and 5.10.256. Until these patched kernels are widely available, temporary mitigations include tightening Yama `ptrace` restrictions by setting `sysctl `kernel.yama.ptrace_scope=2`` (which may impact debugging) or disabling host-based SSH authentication and the `ssh-keysign` helper where not essential.

Severity: Critical

Threat Details and IOCs

CVEs: CVE-2026-46333
Technologies: Debian, Fedora, Linux, OpenSSH, Red Hat Enterprise Linux, Rocky Linux, Ubuntu
Attacker URLs: hxxps[://]github[.]com/0xdeadbeefnetwork/ssh-keysign-pwn, hxxps[://]github[.]com/0xdeadbeefnetwork/ssh-keysign-pwn.git
Victim Industries: Cloud Infrastructure, Financial Services, Government, Information Technology

Mitigation Advice

  • Identify all Linux systems in the environment and update their kernels to a patched version (e.g., 7.0.8, 6.18.31, 6.12.89, 6.6.139, 6.1.173, 5.15.207, 5.10.256 or newer) as soon as they become available for your distribution.
  • On critical or exposed Linux systems that cannot be immediately patched, apply the temporary mitigation by running the command `sysctl -w kernel.yama.ptrace_scope=2` to block the exploit path. Note the potential impact on debugging and monitoring tools.
  • On systems where SSH host-based authentication is not in use, disable the `ssh-keysign` helper binary by removing the setuid bit (`chmod u-s /usr/lib/openssh/ssh-keysign`) or by disabling `EnableSSHKeysign` in the SSH client configuration.
  • Configure file integrity monitoring or use auditd rules to generate alerts for any unexpected read access to sensitive files such as `/etc/shadow`, `/etc/gshadow`, and SSH host private keys (e.g., `/etc/ssh/ssh_host_*_key`).

Compliance Best Practices

  • Review and formalize the organization's patch management policy to ensure critical Linux kernel vulnerabilities are identified, tested, and deployed within a defined and aggressive service-level agreement (SLA).
  • Conduct a periodic audit of all systems to identify and remove unnecessary setuid and setgid permissions on binaries, minimizing the attack surface available to unprivileged users.
  • Establish a policy and automated process for the regular rotation of all SSH host and user keys to limit the time window in which a compromised key can be used for lateral movement or persistence.
  • Develop a roadmap to reduce reliance on password-based authentication by implementing stronger alternatives like certificate-based authentication for SSH and multi-factor authentication (MFA) for all user logins.
  • Evaluate and deploy an Endpoint Detection and Response (EDR) solution on Linux servers to gain visibility into suspicious process behavior, system calls, and file access patterns indicative of a local privilege escalation exploit.

Shai-Hulud Malware In-Depth Analysis: Open Source Means Loss of Control?

Shai-Hulud is a self-propagating npm malicious worm and credential-stealing tool specifically designed for GitHub Actions CI/CD environments, representing a significant threat to the open-source software supply chain. On May 12, the threat actor group TeamPCP open-sourced the malware's full code on GitHub, spreading it via compromised accounts and providing deployment instructions, effectively transforming it from an exclusive weapon into a publicly available tool. The malware employs a four-layer attack architecture to collect sensitive data, targeting local files, GitHub CLI, AWS IMDS/IRSA, Kubernetes tokens, and API secrets, with a particular optimization for Claude Code configuration files. It utilizes a robust regex engine to identify GitHub Personal Access Tokens, npm tokens, and GitHub App JWTs, encrypting and exfiltrating collected data to a C2 domain, `git-tanstack.com`, which impersonates the legitimate `tanstack.com`. The code also includes logic to exclude Russian-language systems, suggesting potential ties to Russian-speaking regions. The open-sourcing has led to the emergence of copycat variants and a significant escalation in the threat level, necessitating immediate action such as auditing GitHub Actions workflows, implementing strict access controls, rotating credentials, monitoring network traffic for Indicators of Compromise, and scanning for malicious npm packages.

Severity: Critical

Threat Details and IOCs

Malware: ACR Stealer, Amatera, AMOS, Atomic macOS Stealer, Atomic Stealer, bw1.js, CANFAIL, CanisterSprawl, CanisterWorm, CipherForce, DripDropper, gh-token-monitor, GlassWorm, GlassWorm v2, GoBear, Gomir, HEUR:Worm.Script.Shulud.gen, js.shai_hulud, LONGSTREAM, mcpAddon.js, mini Shai-Hulud, Mini Shai Hulud, Mini Shai-Hulud, Mini-Shai-Hulud, MorganArg, NFCGate, NGate, PamDOORa, PCPJack, PROMPTSPY, SANDCLOCK, SANDWORM_MODE, sha1-hulud, Sha1-Hulud, SHA1-Hulud, SHA1Hulud, SHA1HULUD, Sha1-Hulud: The Second Coming, Shai-Hulud, Shai Hulud 2.0, Shai-Hulud 2.0, Shai-Hulud 3.0, Shai-Hulud: The Third Coming, Shai-Hulud V2, Shai-Hulud worm, Shulud, Skeleton Key, Sliver, Snow, Snowbasin, SnowBasin, Snowbelt, SnowBelt, Snowglaze, SnowGlaze, TeamPCP cloud stealer, TeamPCP Cloud stealer, TeamPCP Cloud Stealer, TeamPCPCloudStealer, The Golden Path, The Second Coming, Trojan.Skelky, Vect, Vect 2.0, VECT 2.0, VNCSpy, WAVESHAPER, WAVESHAPER.V2, XMRig, ZshBucket, ZshBucket RAT
CVEs: CVE-2025-29927, CVE-2025-48703, CVE-2025-55182, CVE-2025-9501, CVE-2026-1357, CVE-2026-25253, CVE-2026-28353, CVE-2026-31431, CVE-2026-33626, CVE-2026-33634, CVE-2026-33825, CVE-2026-35029, CVE-2026-35030, CVE-2026-42208, CVE-2026-42994, CVE-2026-45321
Technologies: 1Password, Aikido Security, Alpine Linux, Amazon IAM, Amazon Web Services, Amazon Web Services (AWS), Amazon Web Services (AWS) CloudFormation, Anthropic Claude, Apache HTTP Server, Apache Maven, Apple macOS, Apple Safari, Aqua Security Trivy, Atomic Wallet, Automagik, AWS CloudFormation, Bitcoin Core, Bitwarden, Brave Browser, Bun, Cardano, Checkmarx, Checkmarx AST, Checkmarx cx-dev-assist, Checkmarx KICS, Checkmarx Visual Studio Code Extension, CircleCI, Claude Code, Cloudflare, Control Web Panel, Debian, DFINITY Internet Computer Protocol, DigitalOcean, Discord, Docker, Docker Hub, Dogecoin, DraftLab, Eclipse Foundation Open VSX Registry, Endor Labs, Ethereum, Exodus Wallet, Falco, Fastly, FreeBSD, Git, GitHub, GitHub Actions, GitHub Container Registry, GitLab, GNU Bash, GNU Privacy Guard, Google Android, Google Chrome, Google Cloud Platform, Google Cloud Platform (GCP), gopass, Guardrails AI, HashiCorp Terraform, HashiCorp Vault, Intercom, Jenkins, Kubernetes, Linux, Litecoin, LiteLLM, LXC, MetaMask, Microsoft 365, Microsoft Azure AI, Microsoft Azure Key Vault, Microsoft Entra ID, Microsoft npm, Microsoft Visual Studio, Microsoft Windows, Mistral AI, MongoDB Server, NGINX, Node.js, npm, Open Container Initiative runC, OpenSearch, OpenSSH, Open VSX Registry, Oracle Java, pass, Phantom, PHP, Podman, PostgreSQL, PyPI, Python, Python Package Index, Python PyPI, Python Software Foundation Python Package Index, PyTorch Lightning, React, Redis, Ripple, SafeDep, Salesforce, SAP Cloud Application Programming Model, SAP Cloud MTA, SAP Multi-Target Application Build Tool, SAP NetWeaver, Sigstore, Socket.IO, Solana, SQLite, Squawk, StepSecurity, systemd, TanStack, Telegram, Telnyx, UiPath, Vercel Next.js, WordPress, Xorbits Xinference, Yandex Browser, Zcash, Zsh
Threat Actors: Agwagwagwa, Andariel, APT45, BanishedKitten, Bluenoroff, CipherForce, DeadCatx3, FamousChollima, Kimsuky, Lapsus, LAPSUS$, MegaGame10418, OnyxSleet, PCP, PCPcat, PcPcats, PersyPCP, plghost, Sandworm, SHADOW-WATER-058, ShellForce, ShinyHunters, TeamPCP, TeamTNT, UNC1069, UNC2814, UNC6780, VoidDokkaebi
Attacker Countries: Brazil, China, France, Iran, North Korea, Russia, United Kingdom, United States
Attacker IPs: 104[.]21[.]17[.]177, 142[.]11[.]206[.]73, 161[.]97[.]129[.]25, 161[.]97[.]135[.]154, 161[.]97[.]163[.]87, 161[.]97[.]186[.]175, 161[.]97[.]187[.]42, 172[.]67[.]177[.]189, 188[.]114[.]96[.]3, 193[.]187[.]129[.]143, 213[.]136[.]80[.]73, 38[.]242[.]204[.]245, 38[.]242[.]237[.]196, 38[.]242[.]245[.]147, 45[.]148[.]10[.]212, 54[.]67[.]2[.]84, 83[.]142[.]209[.]11, 83[.]142[.]209[.]194, 83[.]142[.]209[.]203, 83[.]171[.]249[.]231, 91[.]195[.]240[.]123, 94[.]154[.]172[.]183, 94[.]154[.]172[.]43
Attacker Emails: claude@users[.]noreply[.]github[.]com, email protected, github-actionsbot@users[.]noreply[.]github[.]com, helloworm00@proton[.]me
Attacker Domains: api[.]cloud-aws[.]adc-e[.]uk, api[.]github[.]com, api[.]masscan[.]cloud, audit[.]checkmarx[.]cx, cdn[.]cloudfront-js[.]com, checkmarx[.]cx, checkmarx[.]zone, cjn37-uyaaa-aaaac-qgnva-cai[.]raw[.]icp0[.]io, cookiemanager[.]ne[.]kr, drnatashachinn[.]com, evangelia[.]edu, filev2[.]getsession[.]org, generativelanguage[.]googleapis[.]com, *[.]getsession[.]org, getsession[.]org, ghcr[.]io, github[.]com, git-tanstack[.]com, igotnofriendsonlineorirl-imgonnakmslmao[.]skyhanni[.]cloud, lastpass-login-help[.]com, litter[.]catbox[.]moe, models[.]litellm[.]cloud, naverbox[.]pe[.]kr, nidiogln[.]ne[.]kr, pbyi76s0e9[.]execute-api[.]us-east-1[.]amazonaws[.]com, plug-tab-protective-relay[.]trycloudflare[.]com, proton[.]me, ptpb[.]pw, registry[.]npmjs[.]org, safely-irc-weblogs-fewtrycloudflarecom, scan[.]aquasecurtiy[.]org, seed1[.]getsession[.]org, seed2[.]getsession[.]org, seed3[.]getsession[.]org, sfrclak[.]com, spm-cdn-assets-dist-2026[.]s3[.]us-east-2[.]amazonaws[.]com, tdtqy-oyaaa-aaaae-af2dq-cai[.]raw[.]icp0[.]io, telemetry[.]api-monitor[.]com, [.]trycloudflare[.]com, trycloudflare[.]com, updates[.]checkmarx[.]cx, users[.]noreply[.]github[.]com, webhook[.]site, whereisitat[.]lucyatemysuperbox[.]space, wud[.]wuaze[.]com, zero[.]masscan[.]cloud
Attacker URLs: 94[.]154[.]172[.]43/v1/telemetry, audit[.]checkmarx[.]cx/v1/telemetry, cjn37-uyaaa-aaaac-qgnva-cai[.]raw[.]icp0[.]io/drop, eucie09111[.]myartsonline[.]com/0502/v.php, generativelanguage[.]googleapis[.]com, github[:]tanstack/router#79ac49eedf774dd4b0cfa308722bc463cfe5885c, git-tanstack[.]com[:]443/router, git-tanstack[.]com/tmp/transformers.pyz, hxxps[://]83[.]142[.]209[.]194/transformers.pyz, hxxps[://]api[.]github[.]com/search/commits, hxxps[://]api[.]github[.]com/search/commits?q=beautifulcastle&sort=author-date&order=desc, hxxps[://]api[.]github[.]com/search/commits?q=beautifulcastle+&sort=author-date&order=desc, hxxps[://]api[.]github[.]com/search/commits?q=EveryBoiWeBuildIsAWormyBoi, hxxps[://]api[.]github[.]com/search/commits?q=LongLiveTheResistanceAgainstMachines&sort=author-date&order=desc&per_page=50, hxxps[://]api[.]github[.]com/user, hxxps[://]audit[.]checkmarx[.]cx/v1/telemetry, hxxps[://]github[.]com/checkmarx/ast-github-action, hxxps[://]github[.]com/gruposbftechrecruiter/ghola-slig-531, hxxps[://]github[.]com/gruposbftechrecruiter/siridar-fedaykin-485, hxxps[://]github[.]com/gruposbftechrecruiter/siridar-sietch-57, hxxps[://]github[.]com/gruposbftechrecruiter/siridar-stillsuit-889, hxxps[://]github[.]com/nikra89/mentat-sandworm-98, hxxps[://]github[.]com/nikra89/sayyadina-ornithopter-43, hxxps[://]github[.]com/nikra89/siridar-heighliner-252, hxxps[://]github[.]com/oven-sh/bun/releases/download/bun-v1.2.13/.zip, hxxps[://]github[.]com/SheepTester/hello-world, hxxps[://]github[.]com/Shrenath1903/tleilaxu-cogitor-127, hxxps[://]github[.]com/shrivathsa11/fedaykin-navigator-270, hxxps[://]github[.]com/TanStack/router/actions/runs/25613093674, hxxps[://]github[.]com/TanStack/router/actions/runs/25691781302, hxxps[://]github[.]com/zblgg/configuration, hxxps[://]git-tanstack[.]com, hxxps[://]git-tanstack[.]com/transformers.pyz, hxxps[://]hub[.]docker[.]com/r/checkmarx/kics, hxxps[://]litter[.]catbox[.]moe/7rrc6l.mjs, hxxps[://]litter[.]catbox[.]moe/h8nc9u.js, hxxps[://]marketplace[.]visualstudio[.]com/items?itemName=checkmarx.ast-results, hxxps[://]marketplace[.]visualstudio[.]com/items?itemName=checkmarx.cx-dev-assist, hxxps[://]open-vsx[.]org/extension/checkmarx/ast-results, hxxps[://]open-vsx[.]org/extension/checkmarx/cx-dev-assist, hxxps[://]ourl[.]co/112923, hxxps[://]registry[.]npmjs[.]org/-/npm/v1/oidc/token/exchange/package/%40bitwarden%2Fcli, hxxps[://]seed1[.]getsession[.]org/json_rpc, hxxps[://]seed2[.]getsession[.]org/json_rpc, hxxps[://]seed3[.]getsession[.]org/json_rpc, hxxps[://]tdtqy-oyaaa-aaaae-af2dq-cai[.]raw[.]icp0[.]io/, hxxps[://]tdtqy-oyaaa-aaaae-af2dq-cai[.]raw[.]icp0[.]io/., hxxps[://]zero[.]masscan[.]cloud/v1/telemetry, hxxp[:]//127.0.0.1:8200, hxxp[:]//169.254.169.254, hxxp[:]//169.254.169.254/latest/meta-data/iam/security-credentials/, hxxp[:]//169.254.170.2, hxxp[:]//fd00:ec2::254, hxxp[:]//filev2.getsession.org/file/, hxxps[:]//83.142.209.194/transformers.pyz, hxxps[:]//83.142.209.194/v1/models, hxxps[:]//api.github.com/search/commits?q=beautifulcastle, hxxps[:]//api.github.com/search/commits?q=beautifulcastle%20&sort=author-date&order=desc, hxxps[:]//api.github.com/search/commits?q=beautifulcastle%20&sort=author-date&order=desc, hxxps[:]//api.github.com/search/commits?q=LongLiveTheResistanceAgainstMachines, hxxps[:]//api.github.com/search/commits?q=LongLiveTheResistanceAgainstMachines&sort=author-date&order=desc&per_page=50, hxxps[:]//api.github.com/search/commits?q=LongLiveTheResistanceAgainstMachines&sort=author-date&order=desc&per_page=50, hxxps[:]//api.github.com/search/commits?q=OhNoWhatsGoingOnWithGitHub&sort=author-date&order=desc&per_page=50, hxxps[:]//audit.checkmarx.cx/v1/telemetry, hxxps[:]//cdn.cloudfront-js.com:8443/u, hxxps[:]//github.com/oven-sh/bun/releases/download/bun-v1.3.13/, hxxps[:]//github.com/oven-sh/bun/releases/download/bun-v1.3.13/.zip, hxxps[:]//git-tanstack.com/transformers.pyz, hxxps[:]//litter.catbox.moe/iqesmbhukgd2c7hq.sh, hxxps[:]//spm-cdn-assets-dist-2026.s3.us-east-2.amazonaws.com, hxxps[:]//whereisitat.lucyatemysuperbox.space, hxxps[:]//whereisitat.lucyatemysuperbox.space/, plugins[.]jenkins[.]io/checkmarx-ast-scanner/releases/, registry[.]npmjs[.]org/-/v1/search?text=maintainer:, sfrclak[.]com[:]8000/6202033, telemetry[.]api-monitor[.]com/v1/drop, telemetry[.]api-monitor[.]com/v1/telemetry, webhook[.]site/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7
Attacker Hashes: 005587975a483876c1fa26b64b418931019be38f, 00ca0c04d247ef09f2b2acc452029345, 01cebc48016395e284ac76afc1816f143ee3e7b6, 01ff1e56fd59a8fa525d97e670f7f297a1a204331b89b2cd4e36a9abc6419203, 03df1ecd86132e06643d24c856d8976d1b497945, 04d8a99447b16f6839fff3b978f88d7e, 077d49fa708f498969d7cdffe701eb64675baaa4968ded9bd97a4936dd56c21c, 0af7415d65753f6aede8c9c0f39be478666b9c12, 0b86434ca5145636d745222f7e49c903ce6ef538, 12f35b1081b17d21815b35feb57ab03d02482116, 14eb4ce01dd4307759887ff819359b70d7d9ff709ecde039a5abc1aac325b128, 167ce57ef59a32a6a0ef4137785828077879092d7f83ddbc1755d6e69116e0ad, 18f784b3bc9a0bcdcb1a8d7f51bc5f54323fc40cbd874119354ab609bef6e4cb, 1d9e4ece8e13c8eaf94cb858470d1bd8f81bb58f62583552303774fa1579edee, 1e8538c6e0563d50da0f2e097e979ebd5294ce1defe01d0b9fe361ba3bed1898, 2258284d65f63829bd67eaba01ef6f1ada2f593f9bbe41678b2df360bd90d3df, 24680027afadea90c7c713821e214b15cb6c922e67ac01109fb1edb3ee4741d9, 258257560fe2f1c2cc3924eae40718c829085b52ae3436b4e46d2565f6996271, 29ac906c8bd801dfe1cb39596197df49f80fff2270b3e7fbab52278c24e4f1a7, 2a6a35f06118ff7d61bfd36a5788557b695095e7c9a609b4a01956883f146f50, 2cd2c5268e41cdece1b0506bcda3b9eba2998119, 2ec78d556d696e208927cc503d48e4b5eb56b31abc2870c2ed2e98d6be27fc96, 2fab324eb0d927846c8744dc0e217beea65138e0, 307d0fa7407d40e67d14e9d5a4c61ac5b4f20431, 339cbf61c80f757085c5afb7304d69f323bdf87a, 35baf8316645372eea40b91d48acb067, 3ddb8967919a801b3c383e58cddceab21138134c6a26560d99e2672e86f36f2a, 3ee893ae46530b92e0d26435fb979d82, 3f3f42d072bd36860ab7bd7fb5e10ac0d22c741c13c89505ccd6ec0ea572eea7, 4066781fa830224c8bbcc3aa005a396657f9c8f9016f9a64ad44a9d7f5f45e34, 40d0f21b64ec8fb3a7a1959897252e09, 45dc9c02f82b4370ca92785282d43a86, 46faab8ab153fae6e80e7cca38eab363075bb524edd79e42269217a083628f09, 484067fd6232f7cdd7b664b33857fc2c, 4b04304f6d51392e3f43856c94ca95800518a694, 5f5852b5f604369945118937b058e49064612ac69826e0adadca39a357dfb5b1, 6060da100b5cd587131a1c11a20d6e0108604744, 619c56acf572df75b6004a6fc013c80900316a76099b241d64312da3a44f10b4, 65bd72fcddaf938cefdf55b3323ad29f649a65d4ddd6aea09afa974dfc7f105d, 65bf499d16a5e8d25ba95d69ec9790a6dd4a1f14, 6bc859aaee1f8885eec2a3016226e877e5adba08, 6f933d00b7d05678eb43c90963a80b8947c4ae6830182f89df31da9f568fea95, 6fb87d243b011b5445f379f80e1a6b4d, 744c9d61b66bcd2bb5474d9afeee6c00bb7e0cd32535781da188b80eb59383e0, 77d92efe7af3547f71fd41d4a884872d66b1be9499eaa637e91eac866911694d, 79ac49eedf774dd4b0cfa308722bc463cfe5885c, 7b0278216ac31ec18eca9eb8bc1c1261a1b26f6c, 7b6a28e92149637e5d7c7f4a2d3e54acd507c929, 7c12d8614c624c70d6dd6fc2ee289332474abaa38f70ebe2cdef064923ca3a9b, 8046a11187c135da6959862ff3846e99ad15462d2ec8a2f77a30ad53ebd5dcf2, 80a3d2877813968ef847ae73b5eeeb70b9435254e74d7f07d8cf4057f0a710ac, 820fa07a7328b6cf2b417078e103721d4d8f2e79, 834b6e5db5710b9308d0598978a0148a9dc832361f1fa0b7ad4343dcceba2812, 848ef1f638807826586802428a7ebafdc710915c, 8605e365edf11160aad517c7d79a3b26b62290e5072ef97b102a01ddbb343f14, 86282ebcd3bebf50f087f2c6b00c62caa667cdcb53558033d85acd39e3d88b41, 87259b0d1d017ad8b8daa7c177c2d9f0940e457f8dd1ab3abab3681e433ca88e, 8cd683f78735c9bfc32600c73d3d9abe, 927387d0cfac1118df4b383decc2ea6ba49c9d2f98b47098bcbcba1efc026e1f, 971670c10eff28339a085ca50a600e35, 9b3257e45b27a6bbe4e240e41a3a306f, 9c7ab48c9fdbbeecdad8433529bdab38584f0e25, a1da198bb4e883d077a0e13351bf2c3acdea10497152292e873d79d4f7420211, a20a9924d92c2b06d82b79c0fe87451c650cabec, ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c, b1e4b1f3aad0d489ab0e9208031c67402bbb8480, b523a69b27064d1715d1f0aaffcfae63, bbbca2ddaa5d8feaa63e36b76fdaad77386f024f, bc95cc5dda788295aa0c9456791520599ef99526, c19c4574d09e60636425f9555d3b63e8cb5c9d63ceb1c982c35e5a310c97a839, c2dd8051d89c4efa71bd67d2df7d9b4bc3e67810, c55a10759f6f415a536940a75f42aa372878a51f8eb97468551eabf6d88ae492, c6ce4e25f7fe3e3bb1eea2e9052483bf, ca4a5bb85778ffcd2153ace88fe2d882c8ceeb23, ce7e4199506959fd7a71b64209b2c07b9c82e53a946aa7d78298dc9249230d01, d37874c6c8a2d2a7a252810a1999ece8bb39e9b3ab2b7e8bf40da15bd36a1584, d446803f4c3bc116263faa3499a1d3f95b2825de, d468f16eafccbc54a994f3d675ace8ae, dbb9b09957113463bbeb420c2c4108b5, de0fac2e4500dabe0009e67214ff5f5447ce83dd, e1e007ce4eab7774785617179d1c01a9381ae83abfd431aae8dba6f82d3ac127, e291734d46c313a23d676681499f8846, e32eaf0c3cde9616831a1e92d42b0058, e7d582b98ca80690883175470e96f703ef6dc497, e80824a19f48d778a746571bb15279b5679fd61c, eb6eb4154b03ec73218727dc643d26f4e14dfda2438112926bb5daf37ae8bcdb, f2157f1cecbf3995aafad750e6e805c472cec466a53d17c2063f266ad2b3d625, f50a96d26a5b0beb29de4127e82b2bf350c21511e5a43d286e43f798dc6cd53f, f7a1e56b6dbd42778fe349b8412ab9749c78fa2bf41ea90b1165615ddfee52e4, fed52a4bbac7b5b6ae4f76cab3eadd67e79227e3, ff7ed7a0fa1c43eed01809d076feedbaed464fc7
Victim Industries: Aerospace, Artificial Intelligence, Automation, Cloud Infrastructure, Consulting Services, Cryptocurrency, E-commerce, Education, Enterprise, Financial Services, Financial Technology, Government, Healthcare, Hospitality, Human Resources, Industrial Sector, Information Security, Information Technology, Insurance, Internet & Cloud Services, Legal Services, Manufacturing, Media and Entertainment, Online Gambling, Pharmaceuticals, Professional Services, Public Sector, Real Estate, Retail, Robotic Process Automation, Security Services, Semiconductors, Social Media, Software, Technology Hardware, Transportation, Utilities & Energy
Victim Countries: Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, India, Iran, Ireland, Israel, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Netherlands, New Zealand, Poland, Portugal, Romania, Russia, Singapore, Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, Ukraine, United Kingdom, United States

Mitigation Advice

  • Block all outbound network traffic to the domain `git-tanstack.com` at the network firewall and in any configured web proxies.
  • On all developer workstations, run scripts to check for the existence and content of the files `~/.claude.json` and `~/.claude/mcp.json`.
  • On all developer workstations and CI/CD runners, inspect local credential files including `~/.git-credentials` and `~/.aws/credentials` for unauthorized or unexpected entries.
  • Use secrets scanning tools with the following regular expressions to search all company code repositories and developer workstations for exposed credentials: `gh[op]_[A-Za-z0-9]{36}`, `npm_[A-Za-z0-9]{36,}`, and `ghs_\d+_[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+`.
  • Scan all `package.json` files across all projects to identify any that contain a `preinstall` script executing `node setup.mjs` or other suspicious commands.
  • Audit all GitHub Actions workflows to identify any steps that use `toJSON(secrets)` to write secrets to logs or artifacts.
  • If any evidence of Shai-Hulud is found, immediately initiate the credential rotation process for all potentially compromised GitHub tokens, npm tokens, AWS keys, and Kubernetes secrets.

Compliance Best Practices

  • Re-architect CI/CD pipelines to use short-lived, ephemeral credentials for authentication to cloud services and registries, such as OpenID Connect (OIDC).
  • Implement network egress filtering for all CI/CD runners to allow outbound connections only to a pre-approved list of domains (e.g., package registries, cloud APIs) and block all other traffic by default.
  • Implement a software composition analysis (SCA) tool that automatically scans third-party dependencies for malicious code patterns and known vulnerabilities as part of the pull request and build processes.
  • Enforce a strict dependency management policy that requires all projects to use lockfiles (e.g., `package-lock.json`) and use deterministic installation commands like `npm ci` in all automated build environments.
  • Deploy and configure an Endpoint Detection and Response (EDR) solution on all developer workstations to monitor for and block suspicious process execution, file modification, and persistence techniques.
  • Establish a continuous security awareness training program for all developers, with modules specifically covering supply chain attack vectors, secure credential management, and how to vet third-party libraries.
Sources

https://arcticwolf.com/resources/blog/mini-shai-hulud-supply-chain-malware-attack/

https://arstechnica.com/information-technology/2026/04/why-a-recent-supply-chain-attack-singled-out-security-firms-checkmarx-and-bitwarden/

https://buaq.net/go-412150.html

https://buaq.net/go-412245.html

https://buaq.net/go-414288.html

https://buaq.net/go-416000.html

https://buaq.net/go-416008.html

https://buaq.net/go-416060.html

https://buaq.net/go-416480.html

https://checkmarx.com/blog/checkmarx-security-update-april-22/

https://checkmarx.com/blog/ongoing-security-updates/

https://cybelangel.com/blog/tanstack-npm-supply-chain-attack/

https://cyberinsider.com/bitwarden-cli-backdoored-in-checkmarx-supply-chain-attack/

https://cyberpress.org/checkmarx-kics-compromised-to-inject-malicious-code/

https://cyberpress.org/namastex-packages-drop-canisterworm/

https://cyberpress.org/npm-attack-targets-credentials/

https://cyberpress.org/pcpjack-targets-cloud-infrastructure/

https://cyberpress.org/sap-npm-packages-compromised/

https://cyberpress.org/teampcp-breachforums-supply-chain-attacks/

https://cyberpress.org/teampcp-targets-jenkins-plugin/

https://cyberscoop.com/mini-shai-hulud-supply-chain-malware-attack/

https://exploit-intel.com/vuln/CVE-2026-45321

https://gbhackers.com/checkmarx-jenkins-ast-plugin/

https://gbhackers.com/checkmarx-kics-docker-repo-hijacked/

https://gbhackers.com/compromised-sap-npm-packages/

https://gbhackers.com/namastex-npm-packages/

https://gbhackers.com/npm-worm-hits-namastex/

https://gbhackers.com/pcpjack-worm-framework/

https://gbhackers.com/xinference-pypi-breach-exposes-developers/

https://hackread.com/google-hackers-used-ai-develop-zero-day-exploit/

https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/

https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/

https://hackread.com/teampcp-mistral-ai-repositories-mini-shai-hulud-attack/

https://isc.sans.edu/diary/rss/32926

https://linuxiac.com/bitwarden-confirms-short-lived-npm-compromise-affecting-cli-package/

https://malwaretips.com/threads/mistral-ai-among-many-others-compromised.141322/

https://meterpreter.org/supply-chain-fallout-lapsus-leaks-96gb-of-stolen-checkmarx-data-following-teampcp-breach/

https://nsfocusglobal.com/xinference-pypi-supply-chain-poisoning-warning/

https://orca.security/resources/blog/checkmarx-supply-chain-compromise-ci-cd-secrets/

https://osintteam.blog/why-trusting-your-vulnerability-scanner-is-a-bad-idea-full-report-e6a8dbaa92c6?source=rss----2983bc435765---4

https://redcanary.com/blog/threat-detection/linux-cgroups/

https://redrays.io/blog/sap-npm-packages-hijacked-to-steal-cloud-credentials-and-weaponize-ai-coding-agents/

https://rhisac.org/threat-intelligence/bitwarden-cli-compromised-in-broader-checkmarx-supply-chain-campaign/

https://securityboulevard.com/2026/04/a-mini-shai-hulud-targeting-the-sap-ecosystem/

https://securityboulevard.com/2026/04/bitwarden-cli-compromise-linked-to-ongoing-checkmarx-supply-chain-campaign/

https://securityboulevard.com/2026/04/shai-hulud-strikes-sap-supply-chain-worm-weaponized-claude-code-to-compromise-the-cap-framework/

https://securityboulevard.com/2026/04/the-butlerian-jihad-compromised-bitwarden-cli-deploys-npm-worm-poisons-ai-assistants-and-dumps-github-secrets/

https://slowmist.medium.com/shai-hulud-malware-in-depth-analysis-open-source-means-loss-of-control-ca49cdc06bf7?source=rss-4ceeedda40e8------2

https://socradar.io/blog/bitwarden-cli-hijacked-npm-supply-chain-teampcp/

https://socradar.io/blog/checkmarx-jenkins-plugin-teampcp-backdoor/

https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html

https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html

https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html

https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html

https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html

https://thehackernews.com/2026/05/pcpjack-credential-stealer-exploits-5.html

https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html

https://www.bleepingcomputer.com/news/security/checkmarx-confirms-lapsus-hackers-leaked-its-stolen-github-data/

https://www.bleepingcomputer.com/news/security/new-checkmarx-supply-chain-breach-affects-kics-analysis-tool/

https://www.bleepingcomputer.com/news/security/new-pcpjack-worm-steals-credentials-cleans-teampcp-infections/

https://www.bleepingcomputer.com/news/security/official-checkmarx-jenkins-package-compromised-with-infostealer/

https://www.bleepingcomputer.com/news/security/official-sap-npm-packages-compromised-to-steal-credentials/

https://www.bleepingcomputer.com/news/security/openai-confirms-security-breach-in-tanstack-supply-chain-attack/

https://www.bleepingcomputer.com/news/security/teampcp-hackers-advertise-mistral-ai-code-repos-for-sale/

https://www.ctfiot.com/307839.html

https://www.ctfiot.com/307867.html

https://www.ctfiot.com/307893.html

https://www.cyberkendra.com/2026/04/bitwarden-cli-hijacked-to-steal-your.html

https://www.cyberkendra.com/2026/04/hackers-poisoned-official-checkmarx.html

https://www.cyberkendra.com/2026/04/lightning-pypi-package-compromised-in.html

https://www.cyberkendra.com/2026/04/sap-cap-npm-packages-backdoored-in-mini.html

https://www.cyberkendra.com/2026/05/tanstack-packages-hit-by-sophisticated.html

https://www.darkreading.com/application-security/worm-redux-fresh-mini-shai-hulud-infections-bite-supply-chain

https://www.darkreading.com/cloud-security/teampcp-malware-pcpjack-steals-cloud-secrets

https://www.darkreading.com/cloud-security/teampcp-sap-packages-mini-shai-hulud

https://www.esecurityplanet.com/threats/checkmarx-supply-chain-attack-exploits-docker-images-and-ci-cd-pipelines/

https://www.esecurityplanet.com/threats/sap-npm-supply-chain-attack-targets-developer-credentials/

https://www.hendryadrian.com/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials/

https://www.hendryadrian.com/namastex-ai-npm-packages-hit-with-teampcp-style-canisterworm-malware/

https://www.hendryadrian.com/new-npm-supply-chain-attack-self-spreads-to-steal-auth-tokens/

https://www.hendryadrian.com/sap-npm-packages-targeted-in-supply-chain-attack/

https://www.hendryadrian.com/shai-hulud-goes-open-source-datadog-security-labs/

https://www.hendryadrian.com/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/

https://www.infosecurity-magazine.com/news/mini-shai-hulud-tanstack-npm/

https://www.infosecurity-magazine.com/news/npm-supply-chain-worm-canister/

https://www.kaspersky.com/blog/why-hackers-target-developers/55630/

https://www.mend.io/blog/malicious-xinference-pypi-teampcp-part-4/

https://www.resecurity.com/blog/article/mini-shai-hulud-a-cross-ecosystem-supply-chain-attack-on-pytorch-lightning-intercom-client

https://www.reversinglabs.com/blog/mini-shai-hulud-tears-at-oss-trust

https://www.reversinglabs.com/blog/the-shai-hulud-code-drop

https://www.scworld.com/brief/supply-chain-attack-against-sap-npm-packages-facilitates-credential-theft

https://www.securitylab.ru/news/572595.php

https://www.securitylab.ru/news/572651.php

https://www.securityweek.com/bitwarden-npm-package-hit-in-supply-chain-attack/

https://www.securityweek.com/checkmarx-confirms-data-stolen-in-supply-chain-attack/

https://www.securityweek.com/checkmarx-jenkins-ast-plugin-compromised-in-supply-chain-attack/

https://www.securityweek.com/pcpjack-worm-removes-teampcp-infections-steals-credentials/

https://www.securityweek.com/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack/

https://www.techradar.com/pro/security/checkmarx-admits-it-was-hit-by-major-cyberattack-that-saw-data-leaked-onto-dark-web

https://www.techzine.eu/news/security/141212/checkmarx-jenkins-plugin-compromised-in-new-supply-chain-attack/

https://www.techzine.eu/news/security/141234/google-ai-likely-aided-in-the-development-of-a-zero-day-vulnerability-for-an-attackgoogle-ai-likely-aided-attackers-to-develop-a-zero-dayw/

https://www.thehackerwire.com/cve-2026-45321-critical-supply-chain-attack-on-tanstack-npm-packages/

https://www.theregister.com/2026/04/22/another_npm_supply_chain_attack/

https://www.theregister.com/2026/04/27/supply_chain_campaign_targets_security/

https://www.theregister.com/2026/04/30/supply_chain_attacks_sap_npm_packages/

https://www.theregister.com/cyber-crime/2026/05/12/cache-poisoning-caper-turns-tanstack-npm-packages-toxic/5238650

https://www.theregister.com/security/2026/05/08/worm-rubs-out-competitors-malware-then-takes-control/5237389

https://www.theregister.com/security/2026/05/11/checkmarx-tackles-another-teampcp-intrusion-as-jenkins-plugin-sabotaged/5237780

https://www.theregister.com/security/2026/05/13/malware-crew-teampcp-open-sources-its-shai-hulud-worm-on-github/5239319

https://www.trendmicro.com/en_us/research/26/e/analyzing-teampcp-supply-chain-attacks.html

https://www.wiz.io/blog/mini-shai-hulud-strikes-again-tanstack-more-npm-packages-compromised

https://www.wiz.io/blog/mini-shai-hulud-supply-chain-sap-npm

Foxconn Attack Highlights Manufacturing's Cyber Crisis

An apparent ransomware attack by the Nitrogen group impacted several of Foxconn's North American facilities, highlighting the manufacturing sector's vulnerability to cybercrime. Foxconn, a major electronics manufacturer for companies like Apple and Google, confirmed a cyberattack affected operations, though it stated production continuity was maintained and factories are resuming normal function. The Nitrogen group claimed to have exfiltrated over 11 million files, totaling 8TBs, including confidential project documentation, engineering schematics, and financial records related to Foxconn's clients such as Intel, Apple, and JPMorgan Chase. While it remains unconfirmed if a ransom was paid, Foxconn is still listed on Nitrogen's leak site. Nitrogen typically gains initial access through SEO poisoning and fake software downloads, and while their usual targets are smaller industrial firms, this incident underscores a broader trend: manufacturing is the most targeted sector for ransomware, experiencing approximately 600 attacks this year, due to its critical supply chain role, low tolerance for downtime, and the extensive sensitive data held from multiple high-profile clients.

Severity: Critical

Threat Details and IOCs

Malware: Conti, LukaLocker, Nitrogen, NitrogenLoader, NitrogenLocker
CVEs: CVE-2023-52271
Technologies: Dell, Microsoft Windows, VMware ESXi
Threat Actors: Conti, Nitrogen, WIZARDSPIDER
Attacker IPs: 104[.]18[.]25[.]181, 104[.]234[.]11[.]121
Attacker Domains: winsccp[.]com
Victim Industries: Financials, Manufacturing, Technology Hardware
Victim Countries: China, Japan, Mexico, Taiwan, United States

Mitigation Advice

  • Add the malicious domain `Winsccp[.]com` and C2 IPs `104.18.25[.]181` and `104.234.11[.]121` to your firewall, DNS blocklists, and web proxy to prevent connections to known Nitrogen command-and-control infrastructure.
  • Use your Endpoint Detection and Response (EDR) platform or antivirus management console to conduct a network-wide search for the file with SHA-256 hash `55f3725ebe01ea19ca14ab14d747a6975f9a6064ca71345219a14c47c18c88be`.
  • Configure your EDR or security monitoring tools to create a high-priority alert if the mutex `nvxkjcv7yxctvgsdfjhv6esdvsx` is created on any endpoint.
  • Use your vulnerability scanner to identify all systems vulnerable to CVE-2023-52271 (`truesight.sys` driver vulnerability) and apply the necessary patches immediately.
  • Create a detection rule in your SIEM or EDR to alert on the use of `bcdedit.exe` to modify boot configurations, specifically looking for commands that disable safe boot.
  • Send a company-wide communication warning all users against downloading software from unofficial sources or search engine results. Specifically mention the risk of fake installers for common tools like AnyDesk, WinSCP, and Cisco AnyConnect.

Compliance Best Practices

  • Develop and implement a mandatory, recurring security awareness training program that includes modules on identifying malicious search engine results, phishing, and the dangers of downloading software from untrusted sources.
  • Implement an application allowlisting policy using a tool like AppLocker or a third-party solution to prevent the execution of unauthorized software, including fake installers downloaded from the internet.
  • Review and enhance the existing data backup and recovery strategy. Ensure that critical systems have regularly tested, offline, and immutable backups to enable recovery from a ransomware attack without paying the ransom.
  • Configure and tune Endpoint Detection and Response (EDR) policies to enable tamper protection features and create high-severity alerts for any attempts to disable or modify security agent services or drivers.
  • Establish a third-party risk management program to regularly assess the security controls and posture of critical vendors and Managed Service Providers (MSPs) to ensure they meet your organization's security requirements.
  • Implement or enhance network egress filtering policies to monitor and alert on anomalous outbound data transfers, and block traffic to unapproved destinations or known malicious infrastructure.

Authors & Contributors

Brian Sayer (Author)

Threat Intelligence Analyst, F5