Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Github requires 2FA and short-lived tokens to enhance NPM supply chain security
Identity

Github requires 2FA and short-lived tokens to enhance NPM supply chain security

userBy userSeptember 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 23, 2025Ravi LakshmananSupply Chain Attacks/Malware

Github announced on Monday it will change its authentication and publishing options for the “near future” in response to a recent wave of supply chain attacks targeting the NPM ecosystem, including the Shai-Hulud attack.

This includes steps to address the threat posed by token abuse and steps to allow local publishing with the required two-factor authentication (2FA) to allow granular tokens with limited lifespan of 7 days, and reliable publishing that allows for the ability to publish NPM packages directly from CI/CD workflows.

In addition to eliminating the need for NPM tokens, trusted publishing establishes encryption trust by authenticating each public with short-lived workflow-specific credentials. More importantly, the NPM CLI automatically generates and publishes the source proof of the package.

“All packages published via trusted publishing contain encrypted proofs of their sources and build environments,” Github said in late July 2025.

DFIR Retainer Service

To support these changes, the Microsoft-owned company said it plans to enact the following steps:

Describing the classic tokens of legacy. Despises time-based one-time password (TOTP) 2FA and migrates users to FIDO-based 2FA. Limit granular tokens with publishing permission to a shorter expiration date. Set public access to tokens that are prohibited by default and promote the use of trusted publishers or 2FA forced local publishing. Remove the option to bypass 2FA for local package publishing. Expand eligible providers for reliable publishing.

The development took place a week after a supply chain attack called the codename Shai-Hulud injected self-replicating worms into hundreds of NPM packages, scanning developer machines and sending them to attacker-controlled servers for sensitive secrets.

“By combining self-replication with the ability to steal multiple types of secrets (as well as npm tokens), the worm may have enabled endless attacks for timely action from Github and open source maintainers.”

The NPM package includes a QR code base

The disclosure comes as software supply chain security company Socket has stated that it has identified a malicious NPM package that allows it to harvest browser passwords using the new Steganographic Technike. Packages can no longer be downloaded from NPM. Since it was first published on August 21, 2025, it has attracted a total of 476 downloads.

“This package includes The Threat Actor (NPM alias Janedu, registration email Janedu0216@gmail[.]com) Run the payload inside a QR code to steal username and password credentials from web cookies in your browser,” said security researcher Olivia Brown.

CIS Build Kit

Fezbox claims to be a JavaScript utility consisting of common helper functions. But in reality, there is a stealth code that gets a QR code from a remote URL, parses the QR code, and executes the JavaScript payload contained within that URL.

The payload reads the document.cookie for that part, extracts username and password information from the cookie, and sends the information to an external server (“my-nest-app-production> .up.railway[.]app”) via https post request.

“Most applications no longer store literal passwords in cookies, so it’s hard to say how successful this malware can be to achieve its goals,” Brown said. “However, using QR codes for further obfuscation is a creative twist by threat actors. This technique shows why it is more important than ever for threat actors to continue to improve their obfuscation techniques and have dedicated tools to check their dependencies.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBADIIS malware spreads through SEO addiction – redirect traffic and plant webshell
Next Article PFA pollution threatens global food security
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.