<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacking News</title>
	<atom:link href="https://www.hackingnews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.hackingnews.com</link>
	<description>Latest Security News, The Hacker Blog</description>
	<lastBuildDate>Wed, 15 Apr 2026 09:51:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<!--Theme by MyThemeShop.com-->
	<item>
		<title>30 WordPress plugins compromised, someone planted a backdoor in all of them</title>
		<link>https://www.hackingnews.com/malware/30-wordpress-plugins-compromised-someone-planted-a-backdoor-in-all-of-them/</link>
		<comments>https://www.hackingnews.com/malware/30-wordpress-plugins-compromised-someone-planted-a-backdoor-in-all-of-them/#respond</comments>
		<pubDate>Wed, 15 Apr 2026 09:51:12 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking Groups]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[Wordpress backdoor]]></category>
		<category><![CDATA[Wordpress hack]]></category>
		<category><![CDATA[Wordpress malware]]></category>
		<category><![CDATA[WP Analytics]]></category>
		<category><![CDATA[WPOS Analytics]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1591</guid>
		<description><![CDATA[<p>The backdoor wasn’t a smash-and-grab. It wasn’t noisy, and it wasn’t rushed. It was planted quietly and left to sit for eight months before anyone flipped the switch. I traced the plugin’s history through 939 quicksave snapshots. The code tells a very specific story if you’re willing to read it line by line. The plugin [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/30-wordpress-plugins-compromised-someone-planted-a-backdoor-in-all-of-them/">30 WordPress plugins compromised, someone planted a backdoor in all of them</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p data-start="75" data-end="241"><img class="aligncenter size-full wp-image-1592" src="https://www.hackingnews.com/wp-content/uploads/2026/04/122995.jpg" alt="122995" width="1000" height="743" srcset="https://www.hackingnews.com/wp-content/uploads/2026/04/122995-300x223.jpg 300w, https://www.hackingnews.com/wp-content/uploads/2026/04/122995-768x571.jpg 768w, https://www.hackingnews.com/wp-content/uploads/2026/04/122995.jpg 1000w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p data-start="75" data-end="241">The backdoor wasn’t a smash-and-grab. It wasn’t noisy, and it wasn’t rushed. It was planted quietly and left to sit for eight months before anyone flipped the switch.</p>
<p data-start="243" data-end="385">I traced the plugin’s history through 939 quicksave snapshots. The code tells a very specific story if you’re willing to read it line by line.</p>
<p data-start="387" data-end="667">The plugin had been on the site since January 2019. The <code data-start="443" data-end="459">wpos-analytics</code> module was always there, functioning as a legitimate analytics opt-in system for years. Nothing unusual. Nothing suspicious. Just another piece of boilerplate tracking code bundled into a widely used plugin.</p>
<p data-start="669" data-end="718">Then came version 2.6.7, released August 8, 2025.</p>
<p data-start="720" data-end="791">The changelog said:<br />
“Check compatibility with WordPress version 6.8.2.”</p>
<p data-start="793" data-end="943">What it actually did was add 191 lines of code, including a PHP deserialization backdoor. The <code data-start="887" data-end="910">class-anylc-admin.php</code> file grew from 473 lines to 664.</p>
<p data-start="945" data-end="995">Buried in that diff were three critical additions:</p>
<ul data-start="997" data-end="1384">
<li data-section-id="30chku" data-start="997" data-end="1132">A <code data-start="1001" data-end="1019">fetch_ver_info()</code> method that calls <code data-start="1038" data-end="1059">file_get_contents()</code> on a remote server and feeds the response directly into <code data-start="1116" data-end="1132">@unserialize()</code></li>
<li data-section-id="6o8y89" data-start="1133" data-end="1303">A <code data-start="1137" data-end="1159">version_info_clean()</code> method that executes <code data-start="1181" data-end="1230">@$clean($this-&gt;version_cache, $this-&gt;changelog)</code> where every variable originates from attacker-controlled serialized data</li>
<li data-section-id="6wti2g" data-start="1304" data-end="1384">An unauthenticated REST API endpoint with <code data-start="1348" data-end="1384">permission_callback: __return_true</code></li>
</ul>
<p data-start="1386" data-end="1596">That is a textbook arbitrary function call vulnerability. The attacker controls the function name, the arguments, and the execution flow. It’s full remote code execution, disguised as version metadata handling.</p>
<p data-start="1598" data-end="1616">And then… nothing.</p>
<p data-start="1618" data-end="1659">No activity. No payload. No exploitation.</p>
<p data-start="1661" data-end="1678">For eight months.</p>
<p data-start="1680" data-end="1702">Until April 5–6, 2026.</p>
<p data-start="1704" data-end="1908">That’s when <code data-start="1716" data-end="1747">analytics.essentialplugin.com</code> began serving malicious payloads to every site running these plugins. The dormant backdoor woke up simultaneously across hundreds of thousands of installations.</p>
<p data-start="1910" data-end="1983">This wasn’t an opportunistic exploit. It was premeditated infrastructure.</p>
<h3 data-section-id="1bprqgm" data-start="1985" data-end="2004">The acquisition</h3>
<p data-start="2006" data-end="2090">The plugin wasn’t originally malicious. That’s what makes this case more concerning.</p>
<p data-start="2092" data-end="2365">It was built by an India-based team—Minesh Shah, Anoop Ranawat, and Pratik Jain—operating under “WP Online Support” starting around 2015. Over time, they built a portfolio of more than 30 free plugins, many with paid upgrades. In 2021, they rebranded to “Essential Plugin.”</p>
<p data-start="2367" data-end="2455">By late 2024, revenue had dropped between 35% and 45%. The business was listed for sale.</p>
<p data-start="2457" data-end="2719">A buyer identified only as “Kris,” with a background in SEO, crypto, and online gambling marketing, acquired the entire portfolio in early 2025 for six figures through Flippa. The transaction wasn’t hidden. It was public. It was even featured as a success story.</p>
<p data-start="2721" data-end="2893">Two days after the original developers’ final commits in May 2025, the ownership transition was complete. Author headers were changed. A new WordPress.org account appeared.</p>
<p data-start="2895" data-end="2963">Then, on August 8, 2025, the first commit from the new owner landed.</p>
<p data-start="2965" data-end="2991">It contained the backdoor.</p>
<p data-start="2993" data-end="3015">The very first commit.</p>
<h3 data-section-id="1oxnhn9" data-start="3017" data-end="3058">Timeline of a supply chain compromise</h3>
<ul data-start="3060" data-end="3748">
<li data-section-id="q6sjjw" data-start="3060" data-end="3124">February 2015 — Domain registered, plugin development begins</li>
<li data-section-id="lrv8ln" data-start="3125" data-end="3172">October 2016 — First major plugin published</li>
<li data-section-id="tnd6qk" data-start="3173" data-end="3218">August 2021 — Rebrand to Essential Plugin</li>
<li data-section-id="rrupvf" data-start="3219" data-end="3276">Late 2024 — Revenue decline, business listed for sale</li>
<li data-section-id="cwq8p3" data-start="3277" data-end="3325">Early 2025 — Acquisition completed by “Kris”</li>
<li data-section-id="aloonb" data-start="3326" data-end="3389">May 2025 — Original developers exit, new account takes over</li>
<li data-section-id="jf6vad" data-start="3390" data-end="3466">August 8, 2025 — Version 2.6.7 introduces backdoor under false changelog</li>
<li data-section-id="k8tmi8" data-start="3467" data-end="3546">August 30, 2025 — WHOIS updated to a Zurich-based identity using ProtonMail</li>
<li data-section-id="1xunfsc" data-start="3547" data-end="3616">April 5–6, 2026 — Backdoor activated, payload distribution begins</li>
<li data-section-id="19kb6ok" data-start="3617" data-end="3687">April 7, 2026 — All plugins from the author closed in a single day</li>
<li data-section-id="ryakhh" data-start="3688" data-end="3748">April 8, 2026 — Forced patch pushed to all installations</li>
</ul>
<p data-start="3750" data-end="3850">Eight months from insertion to activation. No accidental discovery. No early trigger. Just patience.</p>
<h3 data-section-id="yijvuj" data-start="3852" data-end="3873">The mass shutdown</h3>
<p data-start="3875" data-end="3948">On April 7, 2026, the WordPress.org Plugins Team took the nuclear option.</p>
<p data-start="3950" data-end="4190">Every plugin from the Essential Plugin author account was permanently closed. More than 30 plugins disappeared in a single day. The author page now returns nothing. The distribution endpoint returns a simple message: <code data-start="4167" data-end="4189">{"message":"closed"}</code>.</p>
<p data-start="4192" data-end="4367">Among the affected plugins were widely used tools for sliders, galleries, WooCommerce displays, testimonials, and post grids—components embedded deep into production websites.</p>
<p>Here&#8217;s a list with some of the compromised wordpress plugins:</p>
<ul class="wp-block-list">
<li>Accordion and Accordion Slider — <code>accordion-and-accordion-slider</code></li>
<li>Album and Image Gallery Plus Lightbox — <code>album-and-image-gallery-plus-lightbox</code></li>
<li>Audio Player with Playlist Ultimate — <code>audio-player-with-playlist-ultimate</code></li>
<li>Blog Designer for Post and Widget — <code>blog-designer-for-post-and-widget</code></li>
<li>Countdown Timer Ultimate — <code>countdown-timer-ultimate</code></li>
<li>Featured Post Creative — <code>featured-post-creative</code></li>
<li>Footer Mega Grid Columns — <code>footer-mega-grid-columns</code></li>
<li>Hero Banner Ultimate — <code>hero-banner-ultimate</code></li>
<li>HTML5 VideoGallery Plus Player — <code>html5-videogallery-plus-player</code></li>
<li>Meta Slider and Carousel with Lightbox — <code>meta-slider-and-carousel-with-lightbox</code></li>
<li>Popup Anything on Click — <code>popup-anything-on-click</code></li>
<li>Portfolio and Projects — <code>portfolio-and-projects</code></li>
<li>Post Category Image with Grid and Slider — <code>post-category-image-with-grid-and-slider</code></li>
<li>Post Grid and Filter Ultimate — <code>post-grid-and-filter-ultimate</code></li>
<li>Preloader for Website — <code>preloader-for-website</code></li>
<li>Product Categories Designs for WooCommerce — <code>product-categories-designs-for-woocommerce</code></li>
<li>Responsive WP FAQ with Category — <code>sp-faq</code></li>
<li>SlidersPack – All in One Image Sliders — <code>sliderspack-all-in-one-image-sliders</code></li>
<li>SP News And Widget — <code>sp-news-and-widget</code></li>
<li>Styles for WP PageNavi – Addon — <code>styles-for-wp-pagenavi-addon</code></li>
<li>Ticker Ultimate — <code>ticker-ultimate</code></li>
<li>Timeline and History Slider — <code>timeline-and-history-slider</code></li>
<li>Woo Product Slider and Carousel with Category — <code>woo-product-slider-and-carousel-with-category</code></li>
<li>WP Blog and Widgets — <code>wp-blog-and-widgets</code></li>
<li>WP Featured Content and Slider — <code>wp-featured-content-and-slider</code></li>
<li>WP Logo Showcase Responsive Slider and Carousel — <code>wp-logo-showcase-responsive-slider-slider</code></li>
<li>WP Responsive Recent Post Slider — <code>wp-responsive-recent-post-slider</code></li>
<li>WP Slick Slider and Image Carousel — <code>wp-slick-slider-and-image-carousel</code></li>
<li>WP Team Showcase and Slider — <code>wp-team-showcase-and-slider</code></li>
<li>WP Testimonial with Widget — <code>wp-testimonial-with-widget</code></li>
<li>WP Trending Post Slider and Widget — <code>wp-trending-post-slider-and-widget</code></li>
</ul>
<p data-start="4369" data-end="4420">This wasn’t a niche package. It was infrastructure.</p>
<p data-start="4422" data-end="4563">The coordinated shutdown strongly suggests a shared code pattern across all plugins. And that pattern centers on the <code data-start="4539" data-end="4555">wpos-analytics</code> module.</p>
<h3 data-section-id="1p7z3d4" data-start="4565" data-end="4587">The payload vector</h3>
<p data-start="4589" data-end="4630">The attack chain is simple but effective:</p>
<ol data-start="4632" data-end="4816">
<li data-section-id="avhyre" data-start="4632" data-end="4675">Ship benign analytics module for years</li>
<li data-section-id="gkzx8n" data-start="4676" data-end="4718">Introduce backdoor via trusted update</li>
<li data-section-id="onzvfo" data-start="4719" data-end="4763">Wait for adoption across installed base</li>
<li data-section-id="1d3ne7w" data-start="4764" data-end="4816">Activate remote payload delivery simultaneously</li>
</ol>
<p data-start="4818" data-end="5072">The use of <code data-start="4829" data-end="4844">unserialize()</code> on remote data is the critical piece. It allows object injection, which in turn enables arbitrary method calls depending on available classes. Combined with the <code data-start="5006" data-end="5014">$clean</code> function call, it becomes a flexible execution primitive.</p>
<p data-start="5074" data-end="5169">Because the endpoint required no authentication, any external trigger could initiate the chain.</p>
<p data-start="5171" data-end="5282">This is not just a vulnerability—it’s a remotely controlled execution framework embedded in legitimate plugins.</p>
<h3 data-section-id="1ueo0rk" data-start="5284" data-end="5312">This has happened before</h3>
<p data-start="5314" data-end="5348">If this feels familiar, it should.</p>
<p data-start="5350" data-end="5615">In 2017, a buyer using the alias “Daley Tias” purchased the Display Widgets plugin, which had over 200,000 active installs, for $15,000. Within weeks, it was injecting payday loan spam. That same actor went on to compromise multiple plugins using identical tactics.</p>
<p data-start="5617" data-end="5692">The Essential Plugin case follows the same playbook—just at a larger scale.</p>
<p data-start="5694" data-end="5737">More plugins. More installs. More patience.</p>
<h3 data-section-id="1knsfv0" data-start="5739" data-end="5767">Patching and remediation</h3>
<p data-start="5769" data-end="5899">If you still have one of these plugins and haven’t received or trusted the forced update, the remediation path is straightforward:</p>
<ul data-start="5901" data-end="6191">
<li data-section-id="aywsfu" data-start="5901" data-end="5952">Delete the <code data-start="5914" data-end="5931">wpos-analytics/</code> directory entirely</li>
<li data-section-id="18km31t" data-start="5953" data-end="6098">Remove the analytics loader block in the main plugin file (look for markers like “Plugin Wpos Analytics Data Starts” or <code data-start="6075" data-end="6095">wpos_analytics_anl</code>)</li>
<li data-section-id="hu8z6f" data-start="6099" data-end="6152">Bump the version string (e.g., append <code data-start="6139" data-end="6149">-patched</code>)</li>
<li data-section-id="l91t3c" data-start="6153" data-end="6191">Repackage and reinstall the plugin</li>
</ul>
<p data-start="6193" data-end="6238">But plugin cleanup is only part of the story.</p>
<p data-start="6240" data-end="6267">Check your <code data-start="6251" data-end="6266">wp-config.php</code>.</p>
<p data-start="6269" data-end="6362">The malware appends itself onto the same line as:<br />
<code data-start="6319" data-end="6362">require_once ABSPATH . 'wp-settings.php';</code></p>
<p data-start="6364" data-end="6606">Because it doesn’t add a new line, it’s easy to miss. If your config file is larger than expected—roughly 6KB more—you’re likely dealing with an active compromise. At that point, plugin removal isn’t enough. You need a full incident response.</p>
<h3 data-section-id="9alvxc" data-start="6608" data-end="6635">The real problem: Trust</h3>
<p data-start="6637" data-end="6716">This wasn’t a zero-day exploit. It wasn’t a clever bypass of hardened defenses.</p>
<p data-start="6718" data-end="6748">It was a business transaction.</p>
<p data-start="6750" data-end="6949">A legitimate developer built trust over eight years. That trust was sold. The new owner inherited distribution rights and pushed malicious code through the same channel users had relied on for years.</p>
<p data-start="6951" data-end="7110">There is no mechanism in the WordPress plugin ecosystem to flag a change of ownership. No alert to users. No mandatory review when commit access changes hands.</p>
<p data-start="7112" data-end="7205">The acquisition was public. The buyer’s background was public. The risk signals were visible.</p>
<p data-start="7207" data-end="7241">And nothing in the system reacted.</p>
<p data-start="7243" data-end="7405">The Plugins Team acted quickly once the attack was discovered. But the critical window—the eight months between insertion and activation—passed without detection.</p>
<p data-start="7407" data-end="7450">That’s the gap attackers are now targeting.</p>
<h3 data-section-id="q5xolm" data-start="7452" data-end="7470">What to do now</h3>
<p data-start="7472" data-end="7511">If you manage WordPress infrastructure:</p>
<ul data-start="7513" data-end="7753">
<li data-section-id="1vvi0io" data-start="7513" data-end="7561">Audit your plugins against the affected list</li>
<li data-section-id="cjwpit" data-start="7562" data-end="7626">Remove or patch anything from the Essential Plugin portfolio</li>
<li data-section-id="agcb7y" data-start="7627" data-end="7676">Inspect <code data-start="7637" data-end="7652">wp-config.php</code> for inline injections</li>
<li data-section-id="1ndt9oj" data-start="7677" data-end="7753">Assume compromise if the backdoor was active and investigate accordingly</li>
</ul>
<p data-start="7755" data-end="7818">This wasn’t just an isolated incident. It’s a repeatable model.</p>
<p data-start="7755" data-end="7818">Image source: <a href="https://www.freepik.com/free-photo/spyware-computer-hacker-virus-malware-concept_16483261.htm#fromView=search&amp;page=1&amp;position=6&amp;uuid=e599f520-e997-4a68-a1c0-9a5da9349883&amp;query=malware" target="_blank">Freepik</a></p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/30-wordpress-plugins-compromised-someone-planted-a-backdoor-in-all-of-them/">30 WordPress plugins compromised, someone planted a backdoor in all of them</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/malware/30-wordpress-plugins-compromised-someone-planted-a-backdoor-in-all-of-them/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Axios compromised on NPM &#8211; Malicious versions deploy cross-platform RAT</title>
		<link>https://www.hackingnews.com/malware/axios-compromised-on-npm-malicious-versions-deploy-cross-platform-rat/</link>
		<comments>https://www.hackingnews.com/malware/axios-compromised-on-npm-malicious-versions-deploy-cross-platform-rat/#respond</comments>
		<pubDate>Wed, 01 Apr 2026 08:42:05 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[Axios]]></category>
		<category><![CDATA[Axios compromised]]></category>
		<category><![CDATA[Axios hijack]]></category>
		<category><![CDATA[Axios Malware]]></category>
		<category><![CDATA[Axios NPM]]></category>
		<category><![CDATA[NPM Malware]]></category>
		<category><![CDATA[NPM Trojan]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1583</guid>
		<description><![CDATA[<p>A highly sophisticated supply chain attack has struck one of the most widely used JavaScript libraries in the world. Two malicious versions of the popular HTTP client axios—1.14.1 and 0.30.4—were published to npm after a maintainer account was hijacked, introducing a stealthy remote access trojan (RAT) affecting macOS, Windows, and Linux systems. With over 100 [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/axios-compromised-on-npm-malicious-versions-deploy-cross-platform-rat/">Axios compromised on NPM &#8211; Malicious versions deploy cross-platform RAT</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter size-full wp-image-1584" src="https://www.hackingnews.com/wp-content/uploads/2026/04/axios-malware-npm.png" alt="axios-malware-npm" width="1000" height="668" srcset="https://www.hackingnews.com/wp-content/uploads/2026/04/axios-malware-npm-300x200.png 300w, https://www.hackingnews.com/wp-content/uploads/2026/04/axios-malware-npm-768x513.png 768w, https://www.hackingnews.com/wp-content/uploads/2026/04/axios-malware-npm-75x50.png 75w, https://www.hackingnews.com/wp-content/uploads/2026/04/axios-malware-npm.png 1000w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p data-start="90" data-end="446">A highly sophisticated supply chain attack has struck one of the most widely used JavaScript libraries in the world. Two malicious versions of the popular HTTP client <strong data-start="257" data-end="266">axios</strong>—<code data-start="267" data-end="275">1.14.1</code> and <code data-start="280" data-end="288">0.30.4</code>—were published to npm after a maintainer account was hijacked, introducing a stealthy remote access trojan (RAT) affecting macOS, Windows, and Linux systems.</p>
<p data-start="448" data-end="661">With over <strong data-start="458" data-end="490">100 million weekly downloads</strong>, axios sits at the core of countless applications. This incident represents one of the most precise and operationally advanced attacks ever observed in the npm ecosystem.</p>
<h2 data-section-id="fltc9d" data-start="668" data-end="691">Immediate warning</h2>
<p data-start="693" data-end="710">If you installed:</p>
<ul data-start="711" data-end="748">
<li data-section-id="1b6g0ap" data-start="711" data-end="729"><code data-start="713" data-end="727">axios@1.14.1</code></li>
<li data-section-id="1dealgj" data-start="730" data-end="748"><code data-start="732" data-end="746">axios@0.30.4</code></li>
</ul>
<p data-start="750" data-end="788"><strong data-start="750" data-end="788">Assume your system is compromised.</strong></p>
<h2 data-section-id="o5y4je" data-start="795" data-end="822">How the attack worked</h2>
<h3 data-section-id="14l5vis" data-start="824" data-end="856">1. Maintainer account hijack</h3>
<p data-start="857" data-end="1050">The attacker gained control of a primary axios maintainer’s npm account and used it to publish malicious versions directly to npm—bypassing the project’s secure GitHub Actions release pipeline.</p>
<p data-start="1052" data-end="1067">These releases:</p>
<ul data-start="1068" data-end="1244">
<li data-section-id="5lveoq" data-start="1068" data-end="1116">Appeared legitimate (same maintainer identity)</li>
<li data-section-id="f2gzio" data-start="1117" data-end="1162">Had no corresponding GitHub commits or tags</li>
<li data-section-id="1ov9mxn" data-start="1163" data-end="1244">Were published using a stolen long-lived npm token (not secure OIDC publishing)</li>
</ul>
<h3 data-section-id="1xi84id" data-start="1251" data-end="1289">2. Pre-staged malicious dependency</h3>
<p data-start="1291" data-end="1338">The attacker quietly published a package named:</p>
<div class="relative w-full mt-4 mb-1">
<div class="">
<div class="relative">
<div class="h-full min-h-0 min-w-0">
<div class="h-full min-h-0 min-w-0">
<div class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl">
<div class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback">
<div class="pointer-events-none absolute end-1.5 top-1 z-2 md:end-2 md:top-1"></div>
<div class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3">
<div class="relative z-0 flex max-w-full">
<div id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼk ͼy" dir="ltr">
<div class="cm-scroller">
<div class="cm-content q9tKkq_readonly">plain-crypto-js@4.2.1</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class=""></div>
</div>
</div>
</div>
<p data-start="1371" data-end="1384">This package:</p>
<ul data-start="1385" data-end="1570">
<li data-section-id="uza3x7" data-start="1385" data-end="1423">Mimicked a legitimate crypto library</li>
<li data-section-id="28vjui" data-start="1424" data-end="1482">Included <strong data-start="1435" data-end="1482">no obvious malicious code in its main files</strong></li>
<li data-section-id="19ga5tz" data-start="1483" data-end="1570">
<p data-start="1485" data-end="1525">Contained a hidden <code data-start="1504" data-end="1517">postinstall</code> script:</p>
<div class="relative w-full mt-4 mb-1">
<div class="">
<div class="relative">
<div class="h-full min-h-0 min-w-0">
<div class="h-full min-h-0 min-w-0">
<div class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl">
<div class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback">
<div class="pointer-events-none absolute end-1.5 top-1 z-2 md:end-2 md:top-1"></div>
<div class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3">
<div class="relative z-0 flex max-w-full">
<div id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼk ͼy" dir="ltr">
<div class="cm-scroller">
<div class="cm-content q9tKkq_readonly">&#8220;postinstall&#8221;: &#8220;node setup.js&#8221;</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class=""></div>
</div>
</div>
</div>
</li>
</ul>
<p data-start="1572" data-end="1646">This script executed automatically during installation—no import required.</p>
<h3 data-section-id="5ktoer" data-start="1653" data-end="1691">3. Dependency Injection into axios</h3>
<p data-start="1693" data-end="1758">The compromised axios versions added a <strong data-start="1732" data-end="1757">single new dependency</strong>:</p>
<div class="relative w-full mt-4 mb-1">
<div class="">
<div class="relative">
<div class="h-full min-h-0 min-w-0">
<div class="h-full min-h-0 min-w-0">
<div class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl">
<div class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback">
<div class="pointer-events-none absolute end-1.5 top-1 z-2 md:end-2 md:top-1"></div>
<div class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3">
<div class="relative z-0 flex max-w-full">
<div id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼk ͼy" dir="ltr">
<div class="cm-scroller">
<div class="cm-content q9tKkq_readonly">&#8220;plain-crypto-js&#8221;: &#8220;^4.2.1&#8221;</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class=""></div>
</div>
</div>
</div>
<p data-start="1797" data-end="1807">That’s it.</p>
<p data-start="1809" data-end="1871">No other files changed. No malicious code inside axios itself.</p>
<p data-start="1873" data-end="1915">This is what made the attack so dangerous:</p>
<ul data-start="1916" data-end="2072">
<li data-section-id="100li8x" data-start="1916" data-end="1965">Static code inspection shows nothing suspicious</li>
<li data-section-id="utlok4" data-start="1966" data-end="2020">The payload executes <strong data-start="1989" data-end="2007">during install</strong>, not runtime</li>
<li data-section-id="dcik5d" data-start="2021" data-end="2072">The dependency is never actually used in the code</li>
</ul>
<h2 data-section-id="ulfgxf" data-start="2079" data-end="2124">The payload: Cross-platform RAT dropper</h2>
<p data-start="2126" data-end="2167">Once triggered, the malicious dependency:</p>
<ol data-start="2169" data-end="2396">
<li data-section-id="52495" data-start="2169" data-end="2211">Executes instantly during <code data-start="2198" data-end="2211">npm install</code></li>
<li data-section-id="5bx8xv" data-start="2212" data-end="2262">Contacts a live command-and-control (C2) server</li>
<li data-section-id="1q2qta3" data-start="2263" data-end="2320">Downloads a <strong data-start="2278" data-end="2320">platform-specific second-stage payload</strong></li>
<li data-section-id="1sxuwv4" data-start="2321" data-end="2355">Installs a remote access trojan</li>
<li data-section-id="p150vp" data-start="2356" data-end="2396"><strong data-start="2359" data-end="2396">Deletes itself and wipes evidence</strong></li>
</ol>
<p data-start="2398" data-end="2477">Within <strong data-start="2405" data-end="2418">2 seconds</strong>, the infected system is already beaconing to the attacker.</p>
<h2 data-section-id="52n070" data-start="2484" data-end="2527">Anti-forensics: Designed to disappear</h2>
<p data-start="2529" data-end="2591">This attack didn’t just infect systems—it actively hid itself.</p>
<p data-start="2593" data-end="2609">After execution:</p>
<ul data-start="2610" data-end="2763">
<li data-section-id="1c9fed3" data-start="2610" data-end="2645">The malware deletes its own files</li>
<li data-section-id="3krwn" data-start="2646" data-end="2694">Replaces its <code data-start="2661" data-end="2675">package.json</code> with a clean decoy</li>
<li data-section-id="1k264vk" data-start="2695" data-end="2763">Spoofs its version to appear harmless (<code data-start="2736" data-end="2743">4.2.0</code> instead of <code data-start="2755" data-end="2762">4.2.1</code>)</li>
</ul>
<p data-start="2765" data-end="2772">Result:</p>
<ul data-start="2773" data-end="2884">
<li data-section-id="mmhqyr" data-start="2773" data-end="2806"><code data-start="2775" data-end="2785">npm list</code> shows a safe version</li>
<li data-section-id="lpqolf" data-start="2807" data-end="2836">No malicious scripts remain</li>
<li data-section-id="tvle82" data-start="2837" data-end="2884">Only a leftover directory hints at compromise</li>
</ul>
<p data-start="2886" data-end="2999"><strong data-start="2889" data-end="2914">Key detection signal:</strong><br data-start="2914" data-end="2917" /> If <code data-start="2920" data-end="2950">node_modules/plain-crypto-js</code> exists at all, the dropper has already executed.</p>
<h2 data-section-id="1n63z12" data-start="3006" data-end="3039">Attack timeline (condensed)</h2>
<ul data-start="3041" data-end="3370">
<li data-section-id="1bnhaus" data-start="3041" data-end="3103"><strong data-start="3043" data-end="3070">~18 hours before attack</strong>: Clean decoy package published</li>
<li data-section-id="776yxn" data-start="3104" data-end="3162"><strong data-start="3106" data-end="3132">Moments before release</strong>: Malicious version deployed</li>
<li data-section-id="mblzbs" data-start="3163" data-end="3206"><strong data-start="3165" data-end="3178">00:21 UTC</strong>: axios <code data-start="3186" data-end="3194">1.14.1</code> published</li>
<li data-section-id="9xzoig" data-start="3207" data-end="3250"><strong data-start="3209" data-end="3222">01:00 UTC</strong>: axios <code data-start="3230" data-end="3238">0.30.4</code> published</li>
<li data-section-id="1iefv3g" data-start="3251" data-end="3301"><strong data-start="3253" data-end="3267">~03:15 UTC</strong>: Both versions removed from npm</li>
<li data-section-id="1bpfd25" data-start="3302" data-end="3370"><strong data-start="3304" data-end="3318">~04:26 UTC</strong>: Malicious dependency replaced with security stub</li>
</ul>
<p data-start="3372" data-end="3407">Total exposure window: <strong data-start="3395" data-end="3407">~3 hours</strong></p>
<h2 data-section-id="lzwkgu" data-start="3414" data-end="3450">Why this attack is exceptional</h2>
<p data-start="3452" data-end="3496">This wasn’t opportunistic—it was engineered:</p>
<ul data-start="3498" data-end="3745">
<li data-section-id="1xpcomr" data-start="3498" data-end="3538">Pre-staged infrastructure and payloads</li>
<li data-section-id="1rmxx3o" data-start="3539" data-end="3595">Multi-version targeting (both modern and legacy users)</li>
<li data-section-id="1sd0rwr" data-start="3596" data-end="3632">Near-zero footprint in source code</li>
<li data-section-id="1vcuqs0" data-start="3633" data-end="3671">Rapid execution and self-destruction</li>
<li data-section-id="k2wc9t" data-start="3672" data-end="3704">Anti-forensic version spoofing</li>
<li data-section-id="7b67y7" data-start="3705" data-end="3745">Bypassing trusted publishing pipelines</li>
</ul>
<p data-start="3747" data-end="3806">Every detail suggests <strong data-start="3769" data-end="3805">deliberate, high-skill execution</strong>.</p>
<h2 data-section-id="1mhsyl2" data-start="3813" data-end="3840">Detection &amp; discovery</h2>
<p data-start="3842" data-end="3917">The attack was identified through behavioral monitoring tools that flagged:</p>
<ul data-start="3919" data-end="4045">
<li data-section-id="ked25m" data-start="3919" data-end="3960">Unexpected outbound network connections</li>
<li data-section-id="t0ji5u" data-start="3961" data-end="4013">Calls to a previously unseen domain during CI runs</li>
<li data-section-id="1v4ade2" data-start="4014" data-end="4045">Anomalies in dependency trees</li>
</ul>
<p data-start="4047" data-end="4139">Notably, detection did <strong data-start="4070" data-end="4077">not</strong> come from code review—but from <strong data-start="4109" data-end="4138">runtime behavior analysis</strong>.</p>
<h2 data-section-id="d0xtlo" data-start="4146" data-end="4171">What you should do</h2>
<h3 data-section-id="1uqkycw" data-start="4173" data-end="4200">If you may be affected:</h3>
<ol data-start="4202" data-end="4508">
<li data-section-id="1ye140b" data-start="4202" data-end="4239"><strong data-start="4205" data-end="4239">Isolate the system immediately</strong></li>
<li data-section-id="xnhu5p" data-start="4240" data-end="4299">
<p data-start="4243" data-end="4253">Check for:</p>
<div class="relative w-full mt-4 mb-1">
<div class="">
<div class="relative">
<div class="h-full min-h-0 min-w-0">
<div class="h-full min-h-0 min-w-0">
<div class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl">
<div class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback">
<div class="pointer-events-none absolute end-1.5 top-1 z-2 md:end-2 md:top-1"></div>
<div class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3">
<div class="relative z-0 flex max-w-full">
<div id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼk ͼy" dir="ltr">
<div class="cm-scroller">
<div class="cm-content q9tKkq_readonly">node_modules/plain-crypto-js</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class=""></div>
</div>
</div>
</div>
</li>
<li data-section-id="d0qlem" data-start="4300" data-end="4349">Assume credentials and secrets are compromised</li>
<li data-section-id="mmzdag" data-start="4350" data-end="4415">Rotate:
<ul data-start="4364" data-end="4415">
<li data-section-id="1cgd0gk" data-start="4364" data-end="4374">API keys</li>
<li data-section-id="xk5jhg" data-start="4378" data-end="4388">SSH keys</li>
<li data-section-id="5ibq1s" data-start="4392" data-end="4400">Tokens</li>
<li data-section-id="do785g" data-start="4404" data-end="4415">Passwords</li>
</ul>
</li>
<li data-section-id="1eytev0" data-start="4416" data-end="4458">Rebuild systems from clean environments</li>
<li data-section-id="a52jl6" data-start="4459" data-end="4508">Audit logs for suspicious outbound connections</li>
</ol>
<h2 data-section-id="1udbogm" data-start="4515" data-end="4564">Bigger picture: A supply chain wake-up call</h2>
<p data-start="4566" data-end="4610">This incident highlights a critical reality:</p>
<blockquote data-start="4612" data-end="4737">
<p data-start="4614" data-end="4737">Modern supply chain attacks no longer rely on visible code changes—they exploit trust, automation, and developer workflows.</p>
</blockquote>
<p data-start="4739" data-end="4751">Key lessons:</p>
<ul data-start="4752" data-end="4964">
<li data-section-id="irbhnz" data-start="4752" data-end="4792">“No code changes” does not mean “safe”</li>
<li data-section-id="n03q20" data-start="4793" data-end="4847">Dependencies can execute code without being imported</li>
<li data-section-id="14mmkzq" data-start="4848" data-end="4909">Trusted publisher pipelines are essential—but not foolproof</li>
<li data-section-id="oqt0a1" data-start="4910" data-end="4964">Behavioral monitoring is now mandatory, not optional</li>
</ul>
<p>Source: <a href="https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan#attack-timeline" target="_blank">StepSecurity</a></p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/axios-compromised-on-npm-malicious-versions-deploy-cross-platform-rat/">Axios compromised on NPM &#8211; Malicious versions deploy cross-platform RAT</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/malware/axios-compromised-on-npm-malicious-versions-deploy-cross-platform-rat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anthropic accidentally published Claude Code source via npm source map</title>
		<link>https://www.hackingnews.com/security/claude-codes-source-code-has-been-leaked-via-a-map-file-in-their-npm-registry/</link>
		<comments>https://www.hackingnews.com/security/claude-codes-source-code-has-been-leaked-via-a-map-file-in-their-npm-registry/#respond</comments>
		<pubDate>Wed, 01 Apr 2026 08:27:11 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AI leak]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Anthropic leak]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[Claude code]]></category>
		<category><![CDATA[Claude code leak]]></category>
		<category><![CDATA[Claude code source leak]]></category>
		<category><![CDATA[Code leak]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1575</guid>
		<description><![CDATA[<p>According to a Twitter post, the Claude code source code has been leaked via a map file in their npm registry. Claude code source code has been leaked via a map file in their npm registry! Code: https://t.co/jBiMoOzt8G pic.twitter.com/rYo5hbvEj8 — Chaofan Shou (@Fried_rice) March 31, 2026 &#8212; An interesting article about the Claude Code source code [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/security/claude-codes-source-code-has-been-leaked-via-a-map-file-in-their-npm-registry/">Anthropic accidentally published Claude Code source via npm source map</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter size-large wp-image-1577" src="https://www.hackingnews.com/wp-content/uploads/2026/04/HEuuMaaawAAyY4m-1024x530.jpg" alt="HEuuMaaawAAyY4m" width="960" height="497" srcset="https://www.hackingnews.com/wp-content/uploads/2026/04/HEuuMaaawAAyY4m-300x155.jpg 300w, https://www.hackingnews.com/wp-content/uploads/2026/04/HEuuMaaawAAyY4m-768x398.jpg 768w, https://www.hackingnews.com/wp-content/uploads/2026/04/HEuuMaaawAAyY4m-1024x530.jpg 1024w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<p>According to a Twitter post, the <span class="css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3">Claude code source code has been leaked via a map file in their npm registry.</span></p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">Claude code source code has been leaked via a map file in their npm registry!</p>
<p>Code: <a href="https://t.co/jBiMoOzt8G">https://t.co/jBiMoOzt8G</a> <a href="https://t.co/rYo5hbvEj8">pic.twitter.com/rYo5hbvEj8</a></p>
<p>— Chaofan Shou (@Fried_rice) <a href="https://twitter.com/Fried_rice/status/2038894956459290963?ref_src=twsrc%5Etfw">March 31, 2026</a></p></blockquote>
<p><script src="https://platform.twitter.com/widgets.js" async="" charset="utf-8"></script></p>
<p>&#8212;</p>
<p>An interesting article about the Claude Code source code leak can be find on <a href="https://alex000kim.com/posts/2026-03-31-claude-code-source-leak/" target="_blank">Alex Kim&#8217;s blog</a>.</p>
<p data-start="109" data-end="122"><strong data-start="109" data-end="122">Comments:</strong></p>
<p data-start="124" data-end="359">Anthropic appears to have accidentally shipped a <code data-start="173" data-end="179">.map</code> file with their Claude Code npm package, exposing the full readable source of the CLI tool. The package has since been pulled, but not before it was widely mirrored and dissected.</p>
<p data-start="361" data-end="409">A few interesting findings from the leaked code:</p>
<ul data-start="411" data-end="2322">
<li data-section-id="16c4gmn" data-start="411" data-end="756"><strong data-start="413" data-end="446">Anti-distillation mechanisms:</strong><br data-start="446" data-end="449" /> The client can request “fake tool” injection to poison training data for anyone scraping API traffic. There’s also a system that summarizes intermediate outputs with signed blobs, so recorded traffic doesn’t contain full reasoning chains. Both mechanisms are feature-flagged and relatively easy to bypass.</li>
<li data-section-id="1eyst1g" data-start="758" data-end="1024"><strong data-start="760" data-end="782">“Undercover mode”:</strong><br data-start="782" data-end="785" /> A built-in mode prevents the model from revealing internal codenames or even mentioning “Claude Code.” Notably, it cannot be force-disabled in external contexts, meaning AI-generated contributions may intentionally appear human-authored.</li>
<li data-section-id="g51mej" data-start="1026" data-end="1223"><strong data-start="1028" data-end="1064">Frustration detection via regex:</strong><br data-start="1064" data-end="1067" /> Instead of using an LLM, user frustration is detected with a simple regex matching phrases like “wtf,” “this sucks,” etc. Cheap and fast, if a bit ironic.</li>
<li data-section-id="1lr2qft" data-start="1225" data-end="1541"><strong data-start="1227" data-end="1273">Client attestation at the transport layer:</strong><br data-start="1273" data-end="1276" /> Requests include a placeholder that gets replaced with a hash by Bun’s native HTTP stack (in Zig), allowing the server to verify requests come from an official binary. This acts like lightweight DRM for API access, though it’s gated behind flags and not airtight.</li>
<li data-section-id="6cqbt3" data-start="1543" data-end="1720"><strong data-start="1545" data-end="1574">Operational inefficiency:</strong><br data-start="1574" data-end="1577" /> A comment notes ~250K API calls/day were being wasted due to repeated failures in a compaction routine. Fixed by adding a simple failure cap.</li>
<li data-section-id="zxje1n" data-start="1722" data-end="1949"><strong data-start="1724" data-end="1748">KAIROS (unreleased):</strong><br data-start="1748" data-end="1751" /> The code references a heavily gated autonomous agent mode with background workers, scheduled tasks, memory distillation, and GitHub integration—suggesting an always-on agent system in development.</li>
<li data-section-id="1l19rcp" data-start="1951" data-end="2322"><strong data-start="1953" data-end="1970">Other quirks:</strong>
<ul data-start="1973" data-end="2322">
<li data-section-id="4zmhml" data-start="1973" data-end="2044">A Tamagotchi-style “companion” system (likely an April Fools feature)</li>
<li data-section-id="1p03b27" data-start="2047" data-end="2098">Game-engine-like terminal rendering optimizations</li>
<li data-section-id="1bv1wdd" data-start="2101" data-end="2181">Extensive bash security filtering (23 checks, including Zsh-specific exploits)</li>
<li data-section-id="7vgfj" data-start="2184" data-end="2242">Prompt caching treated as a first-class economic concern</li>
<li data-section-id="1o8r0r" data-start="2245" data-end="2322">A multi-agent orchestration system implemented via prompts rather than code</li>
</ul>
</li>
</ul>
<p data-start="2324" data-end="2574">The broader takeaway: the leak is less about code quality and more about <strong data-start="2397" data-end="2426">product strategy exposure</strong>. Feature flags and hidden capabilities (like KAIROS and anti-distillation efforts) reveal roadmap direction that competitors wouldn’t normally see.</p>
<p data-start="2576" data-end="2768">There’s also an ironic angle: the leak may have been caused by a known Bun issue where source maps are served in production. If so, Anthropic’s own stack may have exposed its flagship product.</p>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node="">Overall, not catastrophic technically—but strategically awkward timing given recent enforcement actions against third-party clients using Claude APIs.</p>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node=""><img class="aligncenter size-large wp-image-1581" src="https://www.hackingnews.com/wp-content/uploads/2026/04/HEubw45WQAA3VRl-823x1024.jpg" alt="HEubw45WQAA3VRl" width="823" height="1024" srcset="https://www.hackingnews.com/wp-content/uploads/2026/04/HEubw45WQAA3VRl-241x300.jpg 241w, https://www.hackingnews.com/wp-content/uploads/2026/04/HEubw45WQAA3VRl-768x955.jpg 768w, https://www.hackingnews.com/wp-content/uploads/2026/04/HEubw45WQAA3VRl-823x1024.jpg 823w, https://www.hackingnews.com/wp-content/uploads/2026/04/HEubw45WQAA3VRl.jpg 1434w" sizes="(max-width: 823px) 100vw, 823px" /></p>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node="">&#8212;</p>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node="">A GitHub user, <a href="https://github.com/instructkr/claw-code" target="_blank">Sigrid Jin</a> was able to create a new project starting from the leaked Claude Code project:</p>
<blockquote>
<p dir="auto">At 4 AM on March 31, 2026, I woke up to my phone blowing up with notifications. The Claude Code source had been exposed, and the entire dev community was in a frenzy. My girlfriend in Korea was genuinely worried I might face legal action from Anthropic just for having the code on my machine — so I did what any engineer would do under pressure: I sat down, ported the core features to Python from scratch, and pushed it before the sun came up.</p>
<p dir="auto">The whole thing was orchestrated end-to-end using <a href="https://github.com/Yeachan-Heo/oh-my-codex">oh-my-codex (OmX)</a> by <a href="https://x.com/bellman_ych" rel="nofollow">@bellman_ych</a> — a workflow layer built on top of OpenAI&#8217;s Codex (<a href="https://x.com/OpenAIDevs" rel="nofollow">@OpenAIDevs</a>). I used <code>$team</code> mode for parallel code review and <code>$ralph</code> mode for persistent execution loops with architect-level verification. The entire porting session — from reading the original harness structure to producing a working Python tree with tests — was driven through OmX orchestration.</p>
<p dir="auto">The result is a clean-room Python rewrite that captures the architectural patterns of Claude Code&#8217;s agent harness without copying any proprietary source. I&#8217;m now actively collaborating with <a href="https://x.com/bellman_ych" rel="nofollow">@bellman_ych</a> — the creator of OmX himself — to push this further. The basic Python foundation is already in place and functional, but we&#8217;re just getting started. <strong>Stay tuned — a much more capable version is on the way.</strong></p>
</blockquote>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node=""><img class="aligncenter size-large wp-image-1576" src="https://www.hackingnews.com/wp-content/uploads/2026/04/tweet-screenshot-780x1024.png" alt="tweet-screenshot" width="780" height="1024" srcset="https://www.hackingnews.com/wp-content/uploads/2026/04/tweet-screenshot-768x1009.png 768w, https://www.hackingnews.com/wp-content/uploads/2026/04/tweet-screenshot-780x1024.png 780w, https://www.hackingnews.com/wp-content/uploads/2026/04/tweet-screenshot.png 1194w" sizes="(max-width: 780px) 100vw, 780px" /></p>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node="">&#8212;</p>
<p data-start="2770" data-end="2920" data-is-last-node="" data-is-only-node="">You can read more info and find about what exactly was leaked following this <a href="https://xcancel.com/Fried_rice/status/2038894956459290963" target="_blank">Discussion</a>.</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/security/claude-codes-source-code-has-been-leaked-via-a-map-file-in-their-npm-registry/">Anthropic accidentally published Claude Code source via npm source map</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/security/claude-codes-source-code-has-been-leaked-via-a-map-file-in-their-npm-registry/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Notepad++ hijacked by state-sponsored actors</title>
		<link>https://www.hackingnews.com/malware/notepad-hijacked-by-state-sponsored-actors/</link>
		<comments>https://www.hackingnews.com/malware/notepad-hijacked-by-state-sponsored-actors/#respond</comments>
		<pubDate>Mon, 02 Feb 2026 09:54:17 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Hijack]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[Notepad]]></category>
		<category><![CDATA[WinGup]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1566</guid>
		<description><![CDATA[<p>In a sobering reminder that even widely trusted open-source projects can become collateral damage in geopolitical cyber conflict, the Notepad++ project has confirmed a prolonged and highly targeted supply-chain attack that compromised its update delivery infrastructure. The incident, which unfolded quietly over several months in 2025, did not stem from flaws in the Notepad++ codebase [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/notepad-hijacked-by-state-sponsored-actors/">Notepad++ hijacked by state-sponsored actors</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p data-start="50" data-end="523"><img class="aligncenter size-large wp-image-1572" src="https://www.hackingnews.com/wp-content/uploads/2026/02/notepad-hijacked-incident-1024x408.jpg" alt="notepad-hijacked-incident" width="960" height="383" srcset="https://www.hackingnews.com/wp-content/uploads/2026/02/notepad-hijacked-incident-300x120.jpg 300w, https://www.hackingnews.com/wp-content/uploads/2026/02/notepad-hijacked-incident-768x306.jpg 768w, https://www.hackingnews.com/wp-content/uploads/2026/02/notepad-hijacked-incident-1024x408.jpg 1024w, https://www.hackingnews.com/wp-content/uploads/2026/02/notepad-hijacked-incident.jpg 1083w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<p data-start="50" data-end="523">In a sobering reminder that even widely trusted open-source projects can become collateral damage in geopolitical cyber conflict, the Notepad++ project has confirmed a prolonged and highly targeted supply-chain attack that compromised its update delivery infrastructure. The incident, which unfolded quietly over several months in 2025, did not stem from flaws in the Notepad++ codebase itself, but from an infrastructure-level breach at its former shared hosting provider.</p>
<p data-start="525" data-end="901">The disclosure follows the initial security notice published alongside the Notepad++ v8.8.9 release and is the result of an extended investigation conducted jointly by external security experts, the project maintainer, and the hosting provider. The findings paint a picture of a patient, well-resourced adversary exploiting weaknesses beyond the traditional application layer.</p>
<h3 data-start="908" data-end="937">Anatomy of the compromise</h3>
<p data-start="939" data-end="1329">According to forensic analysis, the attackers gained unauthorized access at the hosting provider level, enabling them to intercept and manipulate network traffic destined for <em data-start="1114" data-end="1137">notepad-plus-plus.org</em>. Rather than indiscriminate tampering, the operation was selective: update traffic from specific users was redirected to attacker-controlled infrastructure serving malicious update manifests.</p>
<p data-start="1331" data-end="1803">The technical details of the initial intrusion remain under investigation, but investigators have ruled out vulnerabilities in the Notepad++ application itself. Instead, the compromise leveraged weaknesses in the hosting environment, granting adversaries visibility and control over update-related services. This distinction is critical: it underscores how trust relationships in software distribution pipelines can be abused without touching a single line of source code.</p>
<p data-start="1805" data-end="2203">The campaign is believed to have begun in June 2025. Multiple independent security researchers, examining the tradecraft and targeting discipline involved, have assessed with high confidence that the threat actor was a Chinese state-sponsored group. The narrow targeting profile and sustained operational security are consistent with espionage-oriented objectives rather than criminal monetization.</p>
<h3 data-start="2210" data-end="2239">Hosting provider findings</h3>
<p data-start="2241" data-end="2470">As part of the incident response, a dedicated IR plan was established, with direct coordination between the external response team and the hosting provider. The provider’s subsequent investigation yielded several key conclusions.</p>
<p data-start="2472" data-end="2786">First, logs indicate that the shared hosting server responsible for handling the Notepad++ update endpoint was compromised until September 2, 2025. On that date, scheduled maintenance included kernel and firmware updates, after which no further evidence of active attacker access to the server itself was observed.</p>
<p data-start="2788" data-end="3144">However, the threat did not immediately end there. Despite losing direct server access, the attackers had retained credentials to internal services associated with that environment until December 2, 2025. This residual access may have allowed them to continue redirecting portions of update traffic and returning malicious download URLs during that window.</p>
<p data-start="3146" data-end="3561">Notably, the attackers showed no interest in other tenants on the same shared infrastructure. Logs reveal deliberate reconnaissance for the <em data-start="3286" data-end="3309">notepad-plus-plus.org</em> domain, suggesting prior knowledge of weaknesses in older update verification mechanisms. Attempts to re-exploit the environment after remediation were detected and blocked, indicating that the attackers actively tested whether their access persisted.</p>
<p data-start="3563" data-end="3911">By December 2, 2025, the provider had rotated all potentially exposed credentials, patched the vulnerabilities believed to have enabled the compromise, and verified that no similar indicators of compromise existed across other hosting systems. Clients were proactively migrated to a new server as a precautionary measure early in the investigation.</p>
<h3 data-start="3918" data-end="3945">Timeline reconciliation</h3>
<p data-start="3947" data-end="4387">There remains a modest discrepancy between assessments. The external security experts concluded that malicious activity ceased around November 10, 2025, while the hosting provider’s internal review identified potential residual access until December 2. Reconciling both views, the most conservative estimate places the full compromise period between June and December 2, 2025, at which point all attacker access was definitively terminated.</p>
<p data-start="4389" data-end="4587">From a defensive standpoint, this conservative framing is appropriate. When attribution and dwell time are in question, assuming the longest plausible exposure window is the only responsible course.</p>
<h3 data-start="4594" data-end="4623">Remediation and hardening</h3>
<p data-start="4625" data-end="4935">The Notepad++ maintainer has issued a direct apology to affected users and moved decisively to address the structural weaknesses exposed by the incident. The project’s website has been migrated to a new hosting provider with substantially stronger security controls, reducing reliance on shared infrastructure.</p>
<p data-start="4937" data-end="5370">Equally important are the changes within the application itself. Beginning with v8.8.9, the WinGup updater now verifies both the digital certificate and the cryptographic signature of downloaded installers. The update service’s XML responses are also digitally signed using XMLDSig. Enforcement of certificate and signature verification for update metadata will become mandatory in the upcoming v8.9.2 release, expected within weeks.</p>
<p data-start="5372" data-end="5524">These measures materially raise the bar against similar attacks, transforming what was once a soft trust boundary into a verifiable cryptographic chain.</p>
<p data-start="5372" data-end="5524">Article source: <a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/" target="_blank">https://notepad-plus-plus.org/news/hijacked-incident-info-update/</a></p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/notepad-hijacked-by-state-sponsored-actors/">Notepad++ hijacked by state-sponsored actors</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/malware/notepad-hijacked-by-state-sponsored-actors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Critical security vulnerability in React Server Components enables unauthenticated RCE</title>
		<link>https://www.hackingnews.com/malware/critical-security-vulnerability-in-react-server-components-enables-unauthenticated-rce/</link>
		<comments>https://www.hackingnews.com/malware/critical-security-vulnerability-in-react-server-components-enables-unauthenticated-rce/#respond</comments>
		<pubDate>Wed, 10 Dec 2025 09:34:19 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Next]]></category>
		<category><![CDATA[Next JS]]></category>
		<category><![CDATA[React]]></category>
		<category><![CDATA[React CVE]]></category>
		<category><![CDATA[React JS]]></category>
		<category><![CDATA[React JS vulnerability]]></category>
		<category><![CDATA[React RCE]]></category>
		<category><![CDATA[React Server]]></category>
		<category><![CDATA[React Server Components]]></category>
		<category><![CDATA[React Vulnerability]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1559</guid>
		<description><![CDATA[<p>The React Team has disclosed a critical security vulnerability affecting React Server Components that can allow unauthenticated remote code execution on affected servers. The issue is tracked as CVE-2025-55182 and carries a cvss score of 10.0, the highest possible severity rating. Developers using React Server Components are strongly urged to upgrade immediately. What happened On [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/critical-security-vulnerability-in-react-server-components-enables-unauthenticated-rce/">Critical security vulnerability in React Server Components enables unauthenticated RCE</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p data-start="125" data-end="406"><img class="aligncenter size-large wp-image-1560" src="https://www.hackingnews.com/wp-content/uploads/2025/12/React-JS-CVE-2025-1024x450.jpg" alt="React-JS-CVE-2025" width="960" height="422" srcset="https://www.hackingnews.com/wp-content/uploads/2025/12/React-JS-CVE-2025-300x132.jpg 300w, https://www.hackingnews.com/wp-content/uploads/2025/12/React-JS-CVE-2025-768x338.jpg 768w, https://www.hackingnews.com/wp-content/uploads/2025/12/React-JS-CVE-2025.jpg 1024w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<p data-start="125" data-end="406">The React Team has disclosed a critical security vulnerability affecting React Server Components that can allow unauthenticated remote code execution on affected servers. The issue is tracked as CVE-2025-55182 and carries a cvss score of 10.0, the highest possible severity rating.</p>
<p data-start="408" data-end="491">Developers using React Server Components are strongly urged to upgrade immediately.</p>
<p data-start="493" data-end="506"><strong>What happened</strong></p>
<p data-start="508" data-end="789">On November 29, security researcher Lachlan Davidson reported a flaw in how React decodes payloads sent to React Server Function endpoints. By crafting a malicious http request, an unauthenticated attacker could exploit this decoding logic and execute arbitrary code on the server.</p>
<p data-start="791" data-end="1038">Applications may still be vulnerable even if they do not explicitly define any React Server Function endpoints, so long as they support React Server Components. Additional technical details will be released after the fix rollout is fully complete.</p>
<p data-start="1040" data-end="1070"><strong>Affected packages and versions</strong></p>
<p data-start="1072" data-end="1255">The vulnerability is present in versions <strong>19.0, 19.1.0, 19.1.1, and 19.2.0</strong> of the following packages: <strong>react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack</strong>.</p>
<p data-start="1257" data-end="1271"><strong>Fixed versions</strong></p>
<p data-start="1273" data-end="1437">The issue has been resolved in versions <strong>19.0.1, 19.1.2, and 19.2.1</strong>. Any application using the affected packages should upgrade to one of these versions immediately.</p>
<p data-start="1439" data-end="1458"><strong>Who is not affected</strong></p>
<p data-start="1460" data-end="1643">Applications that do not use server-side React code are not affected. Apps that do not use a framework, bundler, or plugin that supports React Server Components are also not affected.</p>
<p data-start="1645" data-end="1677"><strong>Affected frameworks and bundlers</strong></p>
<p data-start="1679" data-end="1871">Several popular tools depend on or bundle the vulnerable packages. Known affected frameworks and bundlers include Next.js, React Router, Waku, @parcel/rsc, @vitejs/plugin-rsc, and Redwood SDK.</p>
<p data-start="1873" data-end="1966">Additional upgrade instructions for these projects will be provided as they become available.</p>
<p data-start="1968" data-end="1996"><strong>Hosting provider mitigations</strong></p>
<p data-start="1998" data-end="2208">The React Team has worked with multiple hosting providers to apply temporary mitigations. These mitigations should not be relied upon as a permanent solution, and applications must still be updated immediately.</p>
<p data-start="2210" data-end="2232"><strong>Vulnerability overview</strong></p>
<p data-start="2234" data-end="2608">React Server Functions allow a client to call a function that runs on a server. React provides integration points used by frameworks and bundlers to allow React code to execute on both the client and the server. Client-side requests are translated into http requests that are forwarded to the server, where React deserializes them into function calls and returns the result.</p>
<p data-start="2610" data-end="2827">An unauthenticated attacker can craft a malicious request to a Server Function endpoint that triggers remote code execution during deserialization. Further details will be shared once the rollout of fixes is complete.</p>
<p data-start="2829" data-end="2848"><strong>Update instructions</strong></p>
<p data-start="2850" data-end="2857"><strong>Next.js</strong></p>
<p data-start="2859" data-end="2944">All users should upgrade to the latest patched version in their current release line.</p>
<p data-start="2946" data-end="3202">npm install next@15.0.5 for 15.0.x<br data-start="2980" data-end="2983" /> npm install next@15.1.9 for 15.1.x<br data-start="3017" data-end="3020" /> npm install next@15.2.6 for 15.2.x<br data-start="3054" data-end="3057" /> npm install next@15.3.6 for 15.3.x<br data-start="3091" data-end="3094" /> npm install next@15.4.8 for 15.4.x<br data-start="3128" data-end="3131" /> npm install next@15.5.7 for 15.5.x<br data-start="3165" data-end="3168" /> npm install next@16.0.7 for 16.0.x</p>
<p data-start="3204" data-end="3298">Users on Next.js 14.3.0-canary.77 or newer should downgrade to the latest stable 14.x release.</p>
<p data-start="3300" data-end="3319">npm install next@14</p>
<p data-start="3321" data-end="3333"><strong>React Router</strong></p>
<p data-start="3335" data-end="3439">Applications using React Router unstable rsc apis should ensure the following dependencies are upgraded.</p>
<p data-start="3441" data-end="3627">npm install react@latest<br data-start="3465" data-end="3468" /> npm install react-dom@latest<br data-start="3496" data-end="3499" /> npm install react-server-dom-parcel@latest<br data-start="3541" data-end="3544" /> npm install react-server-dom-webpack@latest<br data-start="3587" data-end="3590" /> npm install @vitejs/plugin-rsc@latest</p>
<p data-start="3629" data-end="3633"><strong>Expo</strong></p>
<p data-start="3635" data-end="3745">Developers should consult the guidance published on expo.dev/changelog to learn more about mitigation options.</p>
<p data-start="3747" data-end="3758"><strong>Redwood SDK</strong></p>
<p data-start="3760" data-end="3832">Ensure your application is running rwsdk version 1.0.0-alpha.0 or newer.</p>
<p data-start="3834" data-end="3934">npm install rwsdk@latest<br data-start="3858" data-end="3861" /> npm install react@latest react-dom@latest react-server-dom-webpack@latest</p>
<p data-start="3936" data-end="3940"><strong>Waku</strong></p>
<p data-start="3942" data-end="4001">Upgrade all relevant dependencies to their latest versions.</p>
<p data-start="4003" data-end="4088">npm install react@latest react-dom@latest react-server-dom-webpack@latest waku@latest</p>
<p data-start="4090" data-end="4108"><strong>@vitejs/plugin-rsc</strong></p>
<p data-start="4110" data-end="4158">Upgrade the rsc plugin and related dependencies.</p>
<p data-start="4160" data-end="4227">npm install react@latest react-dom@latest @vitejs/plugin-rsc@latest</p>
<p data-start="4229" data-end="4252"><strong>react-server-dom-parcel</strong></p>
<p data-start="4254" data-end="4326">npm install react@latest react-dom@latest react-server-dom-parcel@latest</p>
<p data-start="4328" data-end="4354"><strong>react-server-dom-turbopack</strong></p>
<p data-start="4356" data-end="4431">npm install react@latest react-dom@latest react-server-dom-turbopack@latest</p>
<p data-start="4433" data-end="4457"><strong>react-server-dom-webpack</strong></p>
<p data-start="4459" data-end="4532">npm install react@latest react-dom@latest react-server-dom-webpack@latest</p>
<p data-start="4534" data-end="4542"><strong>Timeline</strong></p>
<p data-start="4544" data-end="4942">November 29: Lachlan Davidson reported the vulnerability through the Meta bug bounty program.<br data-start="4637" data-end="4640" /> November 30: Meta security researchers confirmed the issue and collaborated with The React Team.<br data-start="4736" data-end="4739" /> December 1: A fix was completed and coordinated with hosting providers and open source projects.<br data-start="4835" data-end="4838" /> December 3: The fix was published to npm and the vulnerability was publicly disclosed as CVE-2025-55182.</p>
<p data-start="4944" data-end="4955"><strong>Attribution</strong></p>
<p data-start="4957" data-end="5091">The React Team thanks Lachlan Davidson for responsibly discovering, reporting, and assisting in the remediation of this vulnerability.</p>
<p data-start="5093" data-end="5189" data-is-last-node="" data-is-only-node="">Source: <a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components">React blog, critical security vulnerability in React server components, December 3, 2025</a></p>
<p data-start="5093" data-end="5189" data-is-last-node="" data-is-only-node="">
<p data-start="408" data-end="491"><strong>Status Update 12 December 2025: New RSC vulnerabilities identified</strong></p>
<p data-start="55" data-end="563">Two additional vulnerabilities (CVE-2025-55184 and CVE-2025-55183) have been identified in the React Server Components (RSC) implementation used by frameworks including Next.js. These issues were uncovered by an external security researcher participating in Vercel and Meta’s bug bounty program, following increased community scrutiny after the React2Shell incident. We appreciate the continued collaboration and responsible disclosure efforts. At this time, there is no evidence of exploitation in the wild.</p>
<p data-start="565" data-end="590"><strong data-start="565" data-end="590">Vulnerability details</strong></p>
<ul data-start="592" data-end="1139">
<li data-start="592" data-end="845">
<p data-start="594" data-end="845"><strong data-start="594" data-end="649">CVE-2025-55184 — High Severity (Denial of Service):</strong><br data-start="649" data-end="652" /> Specially crafted HTTP requests sent to any App Router endpoint can cause the server to hang and consume excessive CPU during deserialization. All versions handling RSC requests are affected.</p>
</li>
<li data-start="847" data-end="1139">
<p data-start="849" data-end="1139"><strong data-start="849" data-end="909">CVE-2025-55183 — Medium Severity (Source Code Exposure):</strong><br data-start="909" data-end="912" /> Malicious HTTP requests to App Router endpoints may result in compiled Server Action source code being returned. While this could expose business logic, secrets are not at risk unless hardcoded directly in Server Action code.</p>
</li>
</ul>
<p data-start="1141" data-end="1160"><strong data-start="1141" data-end="1160">Required action</strong></p>
<p data-start="1162" data-end="1371" data-is-last-node="" data-is-only-node="">These vulnerabilities impact React versions <strong data-start="1206" data-end="1223">19.0.0–19.2.1</strong> and Next.js versions <strong data-start="1245" data-end="1258">13.x–16.x</strong>.<br data-start="1259" data-end="1262" /> If you are running an affected version, <strong data-start="1302" data-end="1325">upgrade immediately</strong>, even if additional mitigations are in place.</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/critical-security-vulnerability-in-react-server-components-enables-unauthenticated-rce/">Critical security vulnerability in React Server Components enables unauthenticated RCE</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/malware/critical-security-vulnerability-in-react-server-components-enables-unauthenticated-rce/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Shai-Hulud Returns: Massive Supply-Chain Attack Infects 1K+ NPM Packages and 27K+ GitHub Repositories Within Hours</title>
		<link>https://www.hackingnews.com/malware/shai-hulud-returns-massive-supply-chain-attack-infects-1k-npm-packages-and-27k-github-repositories-within-hours/</link>
		<comments>https://www.hackingnews.com/malware/shai-hulud-returns-massive-supply-chain-attack-infects-1k-npm-packages-and-27k-github-repositories-within-hours/#respond</comments>
		<pubDate>Wed, 26 Nov 2025 10:12:00 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking Groups]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[advancing ai]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bun]]></category>
		<category><![CDATA[Charlie Eriksen]]></category>
		<category><![CDATA[Helix Guard]]></category>
		<category><![CDATA[HelixGuard]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[NPM]]></category>
		<category><![CDATA[NPM Infection]]></category>
		<category><![CDATA[Shai-Hulud]]></category>
		<category><![CDATA[Step Security]]></category>
		<category><![CDATA[Supply-chain attack]]></category>
		<category><![CDATA[Zapier]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1554</guid>
		<description><![CDATA[<p>The notorious Shai-Hulud malware has resurfaced in one of the most aggressive software supply-chain attacks seen in the open-source ecosystem, compromising more than 1,000 npm packages and triggering a wave of over 27,000 malicious GitHub repositories in mere hours. The campaign abuses a fake Bun JavaScript runtime installer to siphon developer secrets and poison the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/shai-hulud-returns-massive-supply-chain-attack-infects-1k-npm-packages-and-27k-github-repositories-within-hours/">Shai-Hulud Returns: Massive Supply-Chain Attack Infects 1K+ NPM Packages and 27K+ GitHub Repositories Within Hours</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p data-start="267" data-end="694">The notorious Shai-Hulud malware has resurfaced in one of the most aggressive software supply-chain attacks seen in the open-source ecosystem, compromising <strong data-start="423" data-end="455">more than 1,000 npm packages</strong> and triggering a wave of <strong data-start="481" data-end="526">over 27,000 malicious GitHub repositories</strong> in mere hours. The campaign abuses a fake Bun JavaScript runtime installer to siphon developer secrets and poison the broader Node.js ecosystem at unprecedented scale.</p>
<p data-start="267" data-end="694"><img class="aligncenter size-large wp-image-1555" src="https://www.hackingnews.com/wp-content/uploads/2025/11/sha1hulud-affected-github-repo-1024x692.png" alt="sha1hulud-affected-github-repo" width="960" height="649" srcset="https://www.hackingnews.com/wp-content/uploads/2025/11/sha1hulud-affected-github-repo-300x203.png 300w, https://www.hackingnews.com/wp-content/uploads/2025/11/sha1hulud-affected-github-repo-768x519.png 768w, https://www.hackingnews.com/wp-content/uploads/2025/11/sha1hulud-affected-github-repo-1024x692.png 1024w, https://www.hackingnews.com/wp-content/uploads/2025/11/sha1hulud-affected-github-repo.png 1418w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<h2 data-start="696" data-end="730"><strong data-start="699" data-end="730">A rapidly escalating attack</strong></h2>
<p data-start="731" data-end="1112">The new wave emerged over the weekend, beginning with the publication of trojanized versions of well-known packages—including <strong data-start="857" data-end="902">Zapier, ENS Domains, PostHog, and Postman</strong>—to the npm registry. Each malicious version embeds Shai-Hulud’s new payload, designed explicitly to extract developer environment variables and CI/CD secrets and then exfiltrate them to GitHub in encoded form.</p>
<p data-start="1114" data-end="1322">When the malware first appeared in mid-September, Shai-Hulud compromised <em data-start="1187" data-end="1201">187 packages</em>. Today’s campaign has dwarfed that initial outbreak, showing signs of industrial-scale automation and rapid propagation.</p>
<p data-start="1324" data-end="1627"><strong data-start="1324" data-end="1343">Charlie Eriksen</strong>, a malware researcher at Aikido Security, was the first to flag the resurgence. What began as a set of <strong data-start="1447" data-end="1474">105 suspicious packages</strong> quickly ballooned to <strong data-start="1496" data-end="1512">492 packages</strong>, then surged past <strong data-start="1531" data-end="1540">1,000</strong>, as automated attacker pipelines continued to publish new variants at breakneck speed.</p>
<p data-start="1629" data-end="1871">At the time of writing, GitHub searches return <strong data-start="1676" data-end="1704">over 27,600 repositories</strong> containing data exfiltrated by the malware—most believed to belong to developers who unwittingly installed trojanized packages while logged into GitHub or CI systems.</p>
<h2 data-start="1873" data-end="1915"><strong data-start="1876" data-end="1915">Hundreds of maintainers compromised</strong></h2>
<p data-start="1916" data-end="2095">Cloud security researchers at Wiz uncovered roughly <strong data-start="1968" data-end="2002">350 unique maintainer accounts</strong> involved, many of which appear to be legitimate maintainers whose credentials were hijacked.</p>
<p data-start="2097" data-end="2296">They reported activity consistent with “<strong data-start="2137" data-end="2192">1,000 new repositories being added every 30 minutes</strong>,” suggesting an automated propagation engine capable of scaling far beyond earlier Shai-Hulud variants.</p>
<p data-start="2298" data-end="2557">Eriksen confirmed that these repositories were not created directly by the attackers but were the result of infected developers’ systems leaking their own GitHub credentials, which the malware then used to create or modify repos during attempted exfiltration.</p>
<h2 data-start="2559" data-end="2596"><strong data-start="2562" data-end="2596">A fake Bun runtime at the core</strong></h2>
<p data-start="2597" data-end="2802">A technical breakdown from Step Security reveals that the malware’s latest evolution revolves around a weaponized fake Bun runtime, delivered through two files embedded within the compromised npm packages:</p>
<h3 data-start="2804" data-end="2851"><strong data-start="2808" data-end="2851">1. <code data-start="2813" data-end="2827">setup_bun.js</code> — A disguised dropper</strong></h3>
<p data-start="2852" data-end="3013">Presented as a harmless Bun installer, this script is the initial execution point. Once triggered, it deploys the primary payload with elevated stealth measures.</p>
<h3 data-start="3015" data-end="3074"><strong data-start="3019" data-end="3074">2. <code data-start="3024" data-end="3044">bun_environment.js</code> — A 10MB obfuscated payload</strong></h3>
<p data-start="3075" data-end="3202">The second component is unusually large—<strong data-start="3115" data-end="3131">10 megabytes</strong>—and employs what Step Security calls “extreme obfuscation,” including:</p>
<ul data-start="3203" data-end="3377">
<li data-start="3203" data-end="3265">
<p data-start="3205" data-end="3265">A massive hex-encoded blob containing thousands of entries</p>
</li>
<li data-start="3266" data-end="3313">
<p data-start="3268" data-end="3313">Anti-analysis loops to frustrate sandboxing</p>
</li>
<li data-start="3314" data-end="3377">
<p data-start="3316" data-end="3377">Dynamically reconstructed strings to evade static detection</p>
</li>
</ul>
<p data-start="3379" data-end="3471">This file handles the bulk of the secret-stealing behavior and GitHub exfiltration routines.</p>
<h2 data-start="3473" data-end="3519"><strong data-start="3476" data-end="3519">Automated poisoning of the npm registry</strong></h2>
<p data-start="3520" data-end="3578">Investigators believe attackers used automated systems to:</p>
<ol data-start="3579" data-end="3770">
<li data-start="3579" data-end="3616">
<p data-start="3582" data-end="3616">Download legitimate npm packages</p>
</li>
<li data-start="3617" data-end="3692">
<p data-start="3620" data-end="3692">Modify their <code data-start="3633" data-end="3647">package.json</code> files to embed malicious lifecycle scripts</p>
</li>
<li data-start="3693" data-end="3770">
<p data-start="3696" data-end="3770">Upload the altered packages using <strong data-start="3730" data-end="3768">compromised maintainer credentials</strong></p>
</li>
</ol>
<p data-start="3772" data-end="3911">The result: a sprawling supply-chain attack that exploits both npm&#8217;s openness and the decentralized trust model of open-source maintainers.</p>
<h2 data-start="3913" data-end="3966"><strong data-start="3916" data-end="3966">Implications: A new era of supply-chain worms?</strong></h2>
<p data-start="3967" data-end="4050">Unlike typical npm malware, Shai-Hulud behaves more like a <strong data-start="4026" data-end="4034">worm</strong>, automatically:</p>
<ul data-start="4051" data-end="4173">
<li data-start="4051" data-end="4073">
<p data-start="4053" data-end="4073">Infecting packages</p>
</li>
<li data-start="4074" data-end="4098">
<p data-start="4076" data-end="4098">Stealing credentials</p>
</li>
<li data-start="4099" data-end="4126">
<p data-start="4101" data-end="4126">Publishing more malware</p>
</li>
<li data-start="4127" data-end="4173">
<p data-start="4129" data-end="4173">Propagating through developer environments</p>
</li>
</ul>
<p data-start="4175" data-end="4392">The new campaign suggests that threat actors increasingly target <strong data-start="4240" data-end="4263">developer platforms</strong> as a high-leverage attack vector—where a single compromised environment can ripple through thousands of downstream applications.</p>
<h2 data-start="4394" data-end="4445"><strong data-start="4397" data-end="4445">Mitigation and what developers should do now</strong></h2>
<p data-start="4446" data-end="4480">Security teams urge developers to:</p>
<ul data-start="4481" data-end="4779">
<li data-start="4481" data-end="4573">
<p data-start="4483" data-end="4573"><strong data-start="4483" data-end="4509">Audit npm dependencies</strong> for unexpected updates or versions published over the weekend</p>
</li>
<li data-start="4574" data-end="4630">
<p data-start="4576" data-end="4630">Rotate <strong data-start="4583" data-end="4616">GitHub, npm, and CI/CD tokens</strong> immediately</p>
</li>
<li data-start="4631" data-end="4695">
<p data-start="4633" data-end="4695">Scan for indicators of compromise associated with Shai-Hulud</p>
</li>
<li data-start="4696" data-end="4779">
<p data-start="4698" data-end="4779">Consider isolating build environments until the scope of impact becomes clearer</p>
</li>
</ul>
<p data-start="4781" data-end="4860">Given the scale and speed of the attack, additional waves may still be ongoing.</p>
<p data-start="4781" data-end="4860"><strong>Official sources:</strong></p>
<p><a href="https://helixguard.ai/blog/malicious-sha1hulud-2025-11-24" target="_blank">https://helixguard.ai/blog/malicious-sha1hulud-2025-11-24</a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/" target="_blank">https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/</a></p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/malware/shai-hulud-returns-massive-supply-chain-attack-infects-1k-npm-packages-and-27k-github-repositories-within-hours/">Shai-Hulud Returns: Massive Supply-Chain Attack Infects 1K+ NPM Packages and 27K+ GitHub Repositories Within Hours</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/malware/shai-hulud-returns-massive-supply-chain-attack-infects-1k-npm-packages-and-27k-github-repositories-within-hours/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Discord data breach exposes thousands of users’ IDs and personal details</title>
		<link>https://www.hackingnews.com/cyber-crime/discord-data-breach-exposes-thousands-of-users-ids-and-personal-details/</link>
		<comments>https://www.hackingnews.com/cyber-crime/discord-data-breach-exposes-thousands-of-users-ids-and-personal-details/#respond</comments>
		<pubDate>Fri, 10 Oct 2025 15:44:39 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Discord]]></category>
		<category><![CDATA[Discord breach]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1550</guid>
		<description><![CDATA[<p>Discord has confirmed a data breach that may have exposed sensitive information from about 70,000 users. The incident resulted from a security compromise at a third-party service provider that handles the platform’s age verification appeals. When Discord suspects a user might be underage or when local laws require age confirmation, the platform asks for a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/cyber-crime/discord-data-breach-exposes-thousands-of-users-ids-and-personal-details/">Discord data breach exposes thousands of users’ IDs and personal details</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p data-start="80" data-end="323">Discord has confirmed a data breach that may have exposed sensitive information from about 70,000 users. The incident resulted from a security compromise at a third-party service provider that handles the platform’s age verification appeals.</p>
<p data-start="325" data-end="590">When Discord suspects a user might be underage or when local laws require age confirmation, the platform asks for a selfie with a government-issued ID and the user’s Discord username. This information helps the Trust &amp; Safety team verify identity and eligibility.</p>
<p data-start="592" data-end="775">According to <a href="https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service?ref=404media.co" target="_blank">Discord</a>, the exposed data may include ID photos, selfies, and IP addresses, which can reveal general locations. The company says it has already notified affected users.</p>
<p data-start="777" data-end="1065">The situation might be more serious than initially reported. Hackers told <em data-start="851" data-end="862">404 Media</em> they obtained around 1.5 terabytes of data, suggesting the leak could be larger. A Discord spokesperson told <em data-start="972" data-end="983"><a href="https://www.theverge.com/news/797051/discord-government-ids-leaked-data-breach?ref=404media.co" target="_blank">The Verge</a></em> that these claims are “incorrect” and part of an attempt to extort the company.</p>
<p data-start="1067" data-end="1316">The incident highlights growing privacy concerns over age verification systems. Digital rights advocates argue that mandatory ID uploads create unnecessary risks by turning sensitive personal information into attractive targets for cybercriminals.</p>
<p data-start="1318" data-end="1541">Age verification laws are already active in about half of U.S. states, mainly affecting adult content websites. Some platforms, including Pornhub, have chosen to block users in those regions instead of collecting ID data.</p>
<p data-start="1543" data-end="1807" data-is-last-node="" data-is-only-node="">In the U.K., the recently introduced Online Safety Act goes even further, requiring major platforms like YouTube, Spotify, Google, X, and Reddit to verify users’ ages. Critics say the Discord breach shows how such laws can unintentionally put user privacy at risk.</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/cyber-crime/discord-data-breach-exposes-thousands-of-users-ids-and-personal-details/">Discord data breach exposes thousands of users’ IDs and personal details</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/cyber-crime/discord-data-breach-exposes-thousands-of-users-ids-and-personal-details/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Top Cybersecurity Data Breaches of 2023</title>
		<link>https://www.hackingnews.com/cyber-crime/top-cybersecurity-data-breaches-of-2023/</link>
		<comments>https://www.hackingnews.com/cyber-crime/top-cybersecurity-data-breaches-of-2023/#respond</comments>
		<pubDate>Thu, 28 Dec 2023 10:18:11 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking Groups]]></category>
		<category><![CDATA[Security News]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1546</guid>
		<description><![CDATA[<p>The year 2023 witnessed an alarming surge in cyber threats, leaving a trail of compromised data across various sectors globally. From healthcare giants to renowned tech companies, no industry seemed impervious to the escalating wave of cyber attacks. Here’s a recap of some of the most significant data breaches that shook the world in 2023. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/cyber-crime/top-cybersecurity-data-breaches-of-2023/">Top Cybersecurity Data Breaches of 2023</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The year 2023 witnessed an alarming surge in cyber threats, leaving a trail of compromised data across various sectors globally. From healthcare giants to renowned tech companies, no industry seemed impervious to the escalating wave of cyber attacks. Here’s a recap of some of the most significant data breaches that shook the world in 2023.</p>
<h3>Norton Healthcare Data Breach</h3>
<p>In December, Norton Healthcare, a major Kentucky-based healthcare provider, disclosed a breach affecting around 2.5 million individuals. Threat actors gained unauthorized access to sensitive personal information of patients and employees. Although the breach occurred earlier in May, it only came to light this month, raising concerns about the delay in detection and notification.</p>
<h3>Vanderbilt University Medical Center Ransomware Attack</h3>
<p>Another healthcare institution, the Vanderbilt University Medical Center, fell victim to a ransomware attack orchestrated by the Meow ransomware gang. Despite preliminary investigations indicating that patient and employee data remained uncompromised, the incident added to the growing concerns surrounding healthcare cybersecurity vulnerabilities.</p>
<h3>Toronto Public Library&#8217;s Ransomware Attack</h3>
<p>The Toronto Public Library suffered a sophisticated ransomware attack leading to the theft of sensitive personal information stored in their systems since 1998. The Black Basta ransomware gang was identified as the perpetrators, showcasing the evolving tactics of cybercriminals targeting long-standing data repositories.</p>
<h3>Infosys and Boeing Cyber Incidents</h3>
<p>The Indian IT giant Infosys and aircraft manufacturer Boeing faced separate cyber incidents, impacting operations and causing system disruptions. While Infosys experienced a security event affecting its US unit, Boeing encountered a cyber incident involving a threat directed by the LockBit ransomware gang. Notably, Boeing reassured that the incident did not pose threats to flight safety.</p>
<h3>Indian Council of Medical Research Massive Data Breach</h3>
<p>One of the most significant breaches affected around 815 million Indian citizens, exposing Covid test and health data. The breach, brought to light by a US security firm, prompted urgent calls for government intervention and stringent data security measures across governmental agencies.</p>
<h3>Ongoing Threats Across Industries</h3>
<p>The MOVEit file transfer tool vulnerability led to numerous breaches affecting diverse entities like the Ontario Birth Registry, Topgolf Callaway, Freecycle, Forever 21, and Duolingo, showcasing the widespread exploitation of common vulnerabilities.</p>
<h3>Social Media and Tech Giants Under Siege</h3>
<p>Tech behemoths like Reddit, Twitter, and Discord faced data breaches, highlighting persistent vulnerabilities despite previous security measures. The breaches underscored the need for continuous vigilance and proactive security protocols in the face of evolving cyber threats.</p>
<h3>Lessons Learned and the Road Ahead</h3>
<p>The year 2023 served as a stark reminder of the ever-evolving and increasingly sophisticated landscape of cyber threats. These breaches highlighted the urgency for enhanced cybersecurity measures, timely incident response, and collaborative efforts across industries and governments to fortify defenses against relentless cyber adversaries.</p>
<p>As organizations continue to navigate the evolving threat landscape, investing in robust cybersecurity frameworks, employee training, and proactive threat detection and response mechanisms remains paramount to safeguarding sensitive data and ensuring the resilience of digital ecosystems.</p>
<p>Image Source: <a href="https://www.freepik.com/free-photo/computer-monitor-showing-hacked-system-alert-message-flashing-screen-dealing-with-hacking-cyber-crime-attack-display-with-security-breach-warning-malware-threat-close-up_43105879.htm#query=cyber%20security%20breaches&amp;position=34&amp;from_view=search&amp;track=ais&amp;uuid=b3ba73a4-0810-4f8f-a77f-8a72501b821d" target="_blank">Freepik / DCStudio</a></p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/cyber-crime/top-cybersecurity-data-breaches-of-2023/">Top Cybersecurity Data Breaches of 2023</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/cyber-crime/top-cybersecurity-data-breaches-of-2023/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Enhancing Cybersecurity: The Imperative of Biometric Authentication and the Intricacies of Typing Biometrics</title>
		<link>https://www.hackingnews.com/security/enhancing-cybersecurity-the-imperative-of-biometric-authentication-and-the-intricacies-of-typing-biometrics/</link>
		<comments>https://www.hackingnews.com/security/enhancing-cybersecurity-the-imperative-of-biometric-authentication-and-the-intricacies-of-typing-biometrics/#comments</comments>
		<pubDate>Thu, 10 Aug 2023 07:50:30 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Programming]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[biometric authentication]]></category>
		<category><![CDATA[biometrics]]></category>
		<category><![CDATA[biometrics authentication]]></category>
		<category><![CDATA[keystroke dynamics]]></category>
		<category><![CDATA[multi factor authentication]]></category>
		<category><![CDATA[two factor authentication]]></category>
		<category><![CDATA[typing biometrics]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1541</guid>
		<description><![CDATA[<p>In an era defined by rapid technological advancements, safeguarding sensitive information has become paramount. As cyber threats continue to evolve, traditional methods of authentication, such as passwords, are no longer sufficient to protect against sophisticated attacks. Biometric authentication has emerged as a must-have security measure, offering a more robust and user-friendly solution to verify identities. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/security/enhancing-cybersecurity-the-imperative-of-biometric-authentication-and-the-intricacies-of-typing-biometrics/">Enhancing Cybersecurity: The Imperative of Biometric Authentication and the Intricacies of Typing Biometrics</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="flex flex-grow flex-col gap-3">
<div class="min-h-[20px] flex flex-col items-start gap-3 overflow-x-auto whitespace-pre-wrap break-words">
<div class="markdown prose w-full break-words dark:prose-invert light">
<p><img class="aligncenter size-large wp-image-1542" src="https://www.hackingnews.com/wp-content/uploads/2023/08/keystroke-dynamics-typing-biometrics-1024x569.png" alt="keystroke-dynamics-typing-biometrics" width="960" height="533" srcset="https://www.hackingnews.com/wp-content/uploads/2023/08/keystroke-dynamics-typing-biometrics-300x167.png 300w, https://www.hackingnews.com/wp-content/uploads/2023/08/keystroke-dynamics-typing-biometrics-768x427.png 768w, https://www.hackingnews.com/wp-content/uploads/2023/08/keystroke-dynamics-typing-biometrics-1024x569.png 1024w, https://www.hackingnews.com/wp-content/uploads/2023/08/keystroke-dynamics-typing-biometrics.png 1440w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<p>In an era defined by rapid technological advancements, safeguarding sensitive information has become paramount. As cyber threats continue to evolve, traditional methods of authentication, such as passwords, are no longer sufficient to protect against sophisticated attacks. Biometric authentication has emerged as a must-have security measure, offering a more robust and user-friendly solution to verify identities. One intriguing facet of biometrics is keystroke dynamics, also known as typing biometrics, which leverages the unique patterns of individual typing styles to bolster authentication. Let&#8217;s explore the significance of <a href="https://typing.ai" target="_blank">biometric authentication</a> and delve into the intricacies of typing biometrics.</p>
<p><strong>The Need for Biometric Authentication</strong></p>
<p>Traditional authentication methods, like passwords and PINs, have several inherent vulnerabilities. Passwords can be easily forgotten, shared, or stolen through phishing attacks. Even strong passwords are susceptible to brute-force attacks, where attackers systematically attempt different combinations until they find the right one. Biometric authentication addresses these concerns by utilizing physical and behavioral traits unique to each individual.</p>
<p>Biometrics includes a range of characteristics, such as fingerprints, facial features, iris scans, and voice recognition. These traits are nearly impossible to replicate, making them highly secure. Unlike passwords that can be lost or forgotten, biometric data is an inherent part of an individual&#8217;s identity, significantly reducing the risk of unauthorized access.</p>
<p><strong>Typing Biometrics: The Rhythm of Identity</strong></p>
<p>Typing biometrics, also known as keystroke dynamics or typing rhythm analysis, is a compelling subset of behavioral biometrics. It capitalizes on the fact that each person has a distinct typing style, influenced by factors like finger length, muscle memory, and typing habits. <a href="https://typing.ai/blog/why-use-biometric-authentication-in-2023" target="_blank">Keystroke dynamics</a> analyze the unique timing patterns between key presses and key releases, creating a biometric signature that is specific to the individual.</p>
<p>This method of authentication offers several advantages. Firstly, it&#8217;s non-intrusive, requiring users to do nothing more than type as they normally would. It&#8217;s also continuously adaptable, learning and adapting to subtle changes in an individual&#8217;s typing pattern over time. This makes it more reliable than fixed biometric traits that may change due to injury, aging, or environmental factors.</p>
<p>Additionally, typing biometrics enhances the multi-factor authentication concept. By combining something the user knows (e.g., username) with something the user does (typing rhythm), the security posture is significantly improved, making it harder for malicious actors to breach systems.</p>
<p><strong>Real-World Applications and Future Prospects</strong></p>
<p>Typing biometrics has seen adoption in various industries, including finance, healthcare, and technology. It is used for secure access to systems and data, as well as to detect anomalies in user behavior, which can be indicative of a compromised account. Beyond its current applications, the future holds even more potential for typing biometrics.</p>
<p>As technology advances, we may witness the integration of <a href="https://typing.ai" target="_blank">typing biometrics</a> into mobile devices, enhancing the security of smartphones and tablets. Furthermore, the combination of typing biometrics with other behavioral biometric methods, such as mouse movement analysis, could create even more powerful authentication solutions.</p>
<p><strong>Conclusion</strong></p>
<p>In the ever-evolving landscape of cybersecurity, biometric authentication is a must-have. It offers a higher level of security than traditional methods, while also being user-friendly. Typing biometrics, as a subset of <a href="https://typing.ai/about" target="_blank">behavioral biometrics</a>, adds a layer of sophistication and adaptability to authentication systems, making it an invaluable tool for safeguarding sensitive information. By embracing biometrics, we take a crucial step towards a more secure digital future.</p>
</div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/security/enhancing-cybersecurity-the-imperative-of-biometric-authentication-and-the-intricacies-of-typing-biometrics/">Enhancing Cybersecurity: The Imperative of Biometric Authentication and the Intricacies of Typing Biometrics</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/security/enhancing-cybersecurity-the-imperative-of-biometric-authentication-and-the-intricacies-of-typing-biometrics/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Top 10 Cyber Security incidents from the last years</title>
		<link>https://www.hackingnews.com/vulnerability/top-10-cyber-security-incidents-from-the-last-years/</link>
		<comments>https://www.hackingnews.com/vulnerability/top-10-cyber-security-incidents-from-the-last-years/#respond</comments>
		<pubDate>Sat, 31 Dec 2022 09:10:52 +0000</pubDate>
		<dc:creator><![CDATA[snoopy]]></dc:creator>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking Groups]]></category>
		<category><![CDATA[Security News]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[top 10 cyber security]]></category>
		<category><![CDATA[top 10 security]]></category>

		<guid isPermaLink="false">https://www.hackingnews.com/?p=1536</guid>
		<description><![CDATA[<p>There have been many significant cyber security incidents in recent years, and it is difficult to rank them in terms of their importance or impact. Here is a list of ten examples of significant cyber security incidents that have occurred in the past few years: The WannaCry ransomware attack in 2017, which affected more than [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/vulnerability/top-10-cyber-security-incidents-from-the-last-years/">Top 10 Cyber Security incidents from the last years</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter size-large wp-image-1537" src="https://www.hackingnews.com/wp-content/uploads/2022/12/top-10-cyber-security-incidents-1024x631.jpeg" alt="top-10-cyber-security-incidents" width="960" height="592" srcset="https://www.hackingnews.com/wp-content/uploads/2022/12/top-10-cyber-security-incidents-300x185.jpeg 300w, https://www.hackingnews.com/wp-content/uploads/2022/12/top-10-cyber-security-incidents-768x474.jpeg 768w, https://www.hackingnews.com/wp-content/uploads/2022/12/top-10-cyber-security-incidents-1024x631.jpeg 1024w, https://www.hackingnews.com/wp-content/uploads/2022/12/top-10-cyber-security-incidents.jpeg 1080w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<p>There have been many significant cyber security incidents in recent years, and it is difficult to rank them in terms of their importance or impact. Here is a list of ten examples of significant cyber security incidents that have occurred in the past few years:</p>
<ol>
<li>The WannaCry ransomware attack in 2017, which affected more than 200,000 computers in over 150 countries and caused widespread disruption to organizations including the National Health Service in the UK.</li>
<li>The Equifax data breach in 2017, in which the personal information of 143 million people was exposed.</li>
<li>The SolarWinds hack in 2020, in which hackers gained access to the networks of multiple government agencies and private companies through a supply chain attack.</li>
<li>The Marriott data breach in 2018, in which the personal information of up to 500 million guests was exposed.</li>
<li>The Target data breach in 2013, in which the personal information of 40 million credit and debit card customers was exposed.</li>
<li>The Yahoo data breaches in 2013 and 2014, in which the personal information of all 3 billion Yahoo user accounts was exposed.</li>
<li>The Anthem data breach in 2015, in which the personal information of 78.8 million individuals was exposed.</li>
<li>The Adobe data breach in 2013, in which the personal information of 38 million users was exposed.</li>
<li>The Heartbleed vulnerability in 2014, which affected a widely-used open-source encryption software and exposed the personal information of millions of people.</li>
<li>The Dropbox data breach in 2012, in which the login credentials of 68 million user accounts were exposed.</li>
</ol>
<p>These are just a few examples of significant cyber security incidents that have occurred in recent years. It is important for individuals and organizations to be aware of the risks and to take steps to protect themselves against cyber threats.</p>
<p><a href="https://protectumus.com" target="_blank">Cybersecurity</a> refers to the practices and technologies that organizations and individuals use to protect against online threats such as hacking, malware, and phishing. Cyber attacks can take many forms and can have serious consequences, including financial loss, data theft, and damage to an organization&#8217;s reputation. It is important for individuals and organizations to be aware of the risks and to take steps to protect themselves against cyber threats. This can include using strong passwords, keeping software and security protocols up to date, and being cautious when sharing personal or sensitive information online.</p>
<p>The post <a rel="nofollow" href="https://www.hackingnews.com/vulnerability/top-10-cyber-security-incidents-from-the-last-years/">Top 10 Cyber Security incidents from the last years</a> appeared first on <a rel="nofollow" href="https://www.hackingnews.com">Hacking News</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.hackingnews.com/vulnerability/top-10-cyber-security-incidents-from-the-last-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
