Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Wiz investors unravel Google’s $32 billion acquisition

Rivian’s RJ Scaringe thinks we’re developing robots completely wrong

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Github requires 2FA and short-lived tokens to enhance NPM supply chain security
Identity

Github requires 2FA and short-lived tokens to enhance NPM supply chain security

By September 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 23, 2025Ravi LakshmananSupply Chain Attacks/Malware

Github announced on Monday it will change its authentication and publishing options for the “near future” in response to a recent wave of supply chain attacks targeting the NPM ecosystem, including the Shai-Hulud attack.

This includes steps to address the threat posed by token abuse and steps to allow local publishing with the required two-factor authentication (2FA) to allow granular tokens with limited lifespan of 7 days, and reliable publishing that allows for the ability to publish NPM packages directly from CI/CD workflows.

In addition to eliminating the need for NPM tokens, trusted publishing establishes encryption trust by authenticating each public with short-lived workflow-specific credentials. More importantly, the NPM CLI automatically generates and publishes the source proof of the package.

“All packages published via trusted publishing contain encrypted proofs of their sources and build environments,” Github said in late July 2025.

DFIR Retainer Service

To support these changes, the Microsoft-owned company said it plans to enact the following steps:

Describing the classic tokens of legacy. Despises time-based one-time password (TOTP) 2FA and migrates users to FIDO-based 2FA. Limit granular tokens with publishing permission to a shorter expiration date. Set public access to tokens that are prohibited by default and promote the use of trusted publishers or 2FA forced local publishing. Remove the option to bypass 2FA for local package publishing. Expand eligible providers for reliable publishing.

The development took place a week after a supply chain attack called the codename Shai-Hulud injected self-replicating worms into hundreds of NPM packages, scanning developer machines and sending them to attacker-controlled servers for sensitive secrets.

“By combining self-replication with the ability to steal multiple types of secrets (as well as npm tokens), the worm may have enabled endless attacks for timely action from Github and open source maintainers.”

The NPM package includes a QR code base

The disclosure comes as software supply chain security company Socket has stated that it has identified a malicious NPM package that allows it to harvest browser passwords using the new Steganographic Technike. Packages can no longer be downloaded from NPM. Since it was first published on August 21, 2025, it has attracted a total of 476 downloads.

“This package includes The Threat Actor (NPM alias Janedu, registration email Janedu0216@gmail[.]com) Run the payload inside a QR code to steal username and password credentials from web cookies in your browser,” said security researcher Olivia Brown.

CIS Build Kit

Fezbox claims to be a JavaScript utility consisting of common helper functions. But in reality, there is a stealth code that gets a QR code from a remote URL, parses the QR code, and executes the JavaScript payload contained within that URL.

The payload reads the document.cookie for that part, extracts username and password information from the cookie, and sends the information to an external server (“my-nest-app-production> .up.railway[.]app”) via https post request.

“Most applications no longer store literal passwords in cookies, so it’s hard to say how successful this malware can be to achieve its goals,” Brown said. “However, using QR codes for further obfuscation is a creative twist by threat actors. This technique shows why it is more important than ever for threat actors to continue to improve their obfuscation techniques and have dedicated tools to check their dependencies.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBADIIS malware spreads through SEO addiction – redirect traffic and plant webshell
Next Article PFA pollution threatens global food security

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Wiz investors unravel Google’s $32 billion acquisition

Rivian’s RJ Scaringe thinks we’re developing robots completely wrong

Physics first, Chinese scientists create a rare “hexagonal diamond” that is harder than natural diamonds

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.