In a supply chain attack, the trending npm package, @ctrl/tinycolor, was in the target. Dastardly versions steal secrets through TruffleHog scanning. The npm package ecosystem has been compromised by a massive supply chain attack with a target on the popular package of the ecosystem, which is the tinycolor package of the control group, and over […] The post NPM Supply Attack: Malicious Tinycolor Steals Secrets Using TruffleHog appeared first on Live Bitcoin News.In a supply chain attack, the trending npm package, @ctrl/tinycolor, was in the target. Dastardly versions steal secrets through TruffleHog scanning. The npm package ecosystem has been compromised by a massive supply chain attack with a target on the popular package of the ecosystem, which is the tinycolor package of the control group, and over […] The post NPM Supply Attack: Malicious Tinycolor Steals Secrets Using TruffleHog appeared first on Live Bitcoin News.

NPM Supply Attack: Malicious Tinycolor Steals Secrets Using TruffleHog

2025/09/17 05:30
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

In a supply chain attack, the trending npm package, @ctrl/tinycolor, was in the target. Dastardly versions steal secrets through TruffleHog scanning.

The npm package ecosystem has been compromised by a massive supply chain attack with a target on the popular package of the ecosystem, which is the tinycolor package of the control group, and over forty more packages. 

These malicious versions contain a hidden script that silently robs sensitive developer secrets, and this has caused panic within the development community. 

The attack involves the use of TruffleHog, which is a legitimate secret scanning tool to search and exfiltrate tokens and cloud credentials within infected machines.

Malicious Versions Infect 40+ Packages, Raising Alarms

The altered versions of the @ctrl/tinycolor (4.1.1 and 4.1.2) include a function that downloads a package, alters its contents, loads a malicious script called bundle.js and repackages the package, and republishes it again. 

This creates self-replicating malware that automatically infects subsequent packages maintained by the same authors.

It affected over 40 packages in a variety of maintainers, including other packages scoped to include @ctrl as well as community modules.

The bundle.js file executes on package installation. It then downloads and runs TruffleHog, which searches the machine and repositories of the developer with sensitive tokens, such as GitHub personal access tokens, npm authentication tokens, and cloud service keys, such as AWS and GCP keys. 

On discovering these secrets, it steals them to a hard-coded external webhook address, revealing the personal credentials of the users without their awareness.

It is not a local machine campaign. It also overwrites malicious GitHub Actions workflows in infected repositories. 

Continuous integration settings can activate this workflow to relay stolen secrets over time to facilitate continuous data leaks.

Self-Spreading Malware Creates Cascading Compromise

The malware spreads automatically with the help of the NpmModule.updatePackage function that allows infecting other packages that are maintained by the same developers. 

Such worm-like behaviour creates a chain of supply-chain compromise that spreads automatically after the initial infection, without requiring manual intervention.

Among the environment variables targeted by the attack are those of GITHUB_TOKEN, NPM_TOKEN, AWS_ACCESS_KEY_ID, and AWS_SECRET_ACCESS_KEY. 

It authenticates tokens in npm and GitHub API, then employs them to write the durable malicious workflows. 

Such measures keep the malware in place during subsequent CI executions and theft of secrets throughout the development pipelines.

Security professionals encourage developers to issue an emergency audit and delete any affected version of a package. 

They suggest rotating any leaked tokens and secrets and tracking abnormal publishing or network traffic to the exfiltration hosts. Detective Daniel dos Santos Pereira was the first to notice the malicious payload and its effects with the help of the automated malware scanner of Socket.

 

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

USD1 Genesis: 0 Fees + 12% APR

USD1 Genesis: 0 Fees + 12% APRUSD1 Genesis: 0 Fees + 12% APR

New users: stake for up to 600% APR. Limited time!