Visualização normal

Antes de ontemWIZ Cloud Threat Landscape

Checkmarx KICS and Bitwarden CLI Compromised in Fresh Supply Chain Attack (Campaign)

Multiple malicious versions of Checkmarx projects have been published, including Docker images and VS Code extensions (this included both publishing new malicious image versions and pointing existing tags to malicious instances). This is a new incident, separate from the March...

PolinRider Campaign: DPRK-Linked Supply Chain Attack Infects GitHub Repositories (Campaign)

A supply chain campaign attributed to a DPRK-linked threat actor, PolinRider, has resulted in the compromise of over 1,900 GitHub repositories through malicious npm packages, VS Code artifacts, and injected JavaScript payloads. The campaign leverages stealthy code injection an...

Stolen SaaS Integration Tokens Enable Data Theft Across Snowflake Environments (Campaign)

The attack originated reportedly from a security incident affecting Anodot, a SaaS analytics and anomaly detection platform that integrates with multiple cloud services (e.g., Snowflake, S3, and streaming pipelines). Threat actors reportedly obtained authentication tokens asso...

O365 Device Code Phishing Campaign using EvilTokens and Abusing Railway Platform (Campaign)

A phishing campaign has been reported leveraging the EvilTokens Phishing-as-a-Service platform to target O365 users. The attackers use device code phishing to bypass Multi-Factor Authentication (MFA), and they also utilize Railway to host their malicious infrastructure. The ca...

Exploitation Campaign of Vulnerable GitHub Workflows (Campaign)

An unknown threat actor has been conducting an opportunistic campaign of automated malicious pull requests to attempt to initiate supply chain compromise against various open source repositories. In at least two cases, the attacker has been able to inject malicious code that u...

UAT-10608 Campaign Abuses React2Shell for Cloud Credential Harvesting (Campaign)

An automated campaign attributed to threat cluster UAT-10608 is exploiting vulnerable Next.js applications to achieve pre-authentication remote code execution and deploy a multi-phase credential harvesting framework. The operation has compromised hundreds of hosts across cloud...

Exploitation of S1ngularity-exposed cloud keys for lateral movement (Incident)

The UNC6426 campaign demonstrates a multi-stage supply chain intrusion that transitioned from developer environment compromise to full cloud takeover within ~72 hours. The attack originated from a prior compromise of the nx npm package, where a malicious postinstall script dep...

SANDWORM_MODE: Typosquatted npm Packages Used to Hijack CI Workflows (Campaign)

According to Socket, the campaign operates as a typosquatting worm: the attacker publishes malicious packages that mimic trusted names (e.g., look-alikes of common utilities and AI coding tools). When one of these malicious packages is installed and imported, it executes a sta...

❌
❌