Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Sandia’s PFAS Detector Can Reduce Water Testing Time to Minutes

UNC6426 Exploit nx npm supply chain attack to gain AWS administrator access within 72 hours

5 malicious Rust crates and AI bots exploit CI/CD pipelines to steal developer secrets

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UNC6426 Exploit nx npm supply chain attack to gain AWS administrator access within 72 hours
Identity

UNC6426 Exploit nx npm supply chain attack to gain AWS administrator access within 72 hours

userBy userMarch 11, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 11, 2026DevSecOps / AI Security

The attacker, known as UNC6426, leveraged keys stolen after last year’s nx npm package supply chain breach to fully compromise victims’ cloud environments within 72 hours.

The attack began with the theft of a developer’s GitHub token, which the threat actor used to gain unauthorized access to the cloud and steal data.

“Threat actors UNC6426 used this access to exploit the OpenID Connect (OIDC) trust between GitHub and AWS and created a new administrator role in their cloud environment,” Google said in its Cloud Threat Horizons report for the first half of 2026. “They exploited this role to access clients’ Amazon Web Services (AWS) Simple Storage. “We extracted files from the service (S3) bucket and performed data destruction in the production cloud environment.”

A supply chain attack targeting the nx npm package occurred in August 2025. At this time, an unknown attacker exploited a vulnerable pull_request_target workflow (an attack type known as Pwn Request) to gain elevated privileges, access sensitive data including GITHUB_TOKEN, and ultimately push a trojanized version of the package to the npm registry.

This package was found to have an embedded post-installation script. The script launches a JavaScript credential stealer named QUIETVAULT and siphons valuable tokens such as environment variables, system information, and GitHub Personal Access Tokens (PATs) by weaponizing the Large Language Model (LLM) tool already installed on the endpoint to perform searches. The data was uploaded to a public GitHub repository named ‘/s1ngularity-repository-1’.

According to Google, an employee of the victim organization ran a code editor application that used the Nx Console plugin, and the process triggered an update that resulted in QUIETVAULT being executed.

UNC6426 allegedly used the stolen PAT to begin reconnaissance operations within the client’s GitHub environment two days after the initial breach, in which it used a legitimate open source tool called Nord Stream to extract secrets from the CI/CD environment and leak GitHub service account credentials.

The attackers then exploited this service account and used the utility’s “–aws-role” parameter to generate temporary AWS Security Token Service (STS) tokens for the “Actions-CloudFormation” role, ultimately allowing them to gain a foothold in the victim’s AWS environment.

“The role of the compromised Github-Actions-CloudFormation was overly permissive,” Google said. “UNC6426 used this permission to deploy a new AWS stack with the feature [“CAPABILITY_NAMED_IAM”,”CAPABILITY_IAM”]. The sole purpose of this stack was to create a new IAM role and attach the arn:aws:iam::aws:policy/AdministratorAccess policy to it. UNC6426 successfully escalated the stolen token to full AWS administrator privileges within 72 hours. ”

Equipped with a new administrator role, the attacker performed a series of actions, including enumerating and accessing objects in an S3 bucket, terminating production Elastic Compute Cloud (EC2) and Relational Database Service (RDS) instances, and decrypting application keys. In the final stage, all of the victim’s internal GitHub repositories were renamed to ‘/s1ngularity-repository-‘.[randomcharacters]” was released.

To combat such threats, use a package manager that prevents post-installation scripts and sandboxing tools, enforce the principle of least privilege (PoLP) on CI/CD service accounts and OIDC-linked roles, enforce fine-grained PATs with short expiration times and specific repository permissions, remove fixed permissions for risky actions such as creating administrator roles, monitor for anomalous IAM activity, and use Shadow AI. We recommend implementing strong controls to detect risks.

The incident highlights what Socket described as an AI-powered supply chain abuse in which execution is offloaded to an AI agent that already has privileged access to a developer’s file system, credentials, and authenticated tools.

“Malicious intent is expressed through natural language prompts rather than explicit network callbacks or hard-coded endpoints, complicating traditional detection approaches,” the software supply chain security firm said. “As AI assistants become more integrated into developer workflows, the attack surface also expands. Any tool that can invoke an AI assistant will inherit that scope.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article5 malicious Rust crates and AI bots exploit CI/CD pipelines to steal developer secrets
Next Article Sandia’s PFAS Detector Can Reduce Water Testing Time to Minutes
user
  • Website

Related Posts

5 malicious Rust crates and AI bots exploit CI/CD pipelines to steal developer secrets

March 11, 2026

FortiGate devices are exploited to infiltrate the network and steal service account credentials

March 10, 2026

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Sandia’s PFAS Detector Can Reduce Water Testing Time to Minutes

UNC6426 Exploit nx npm supply chain attack to gain AWS administrator access within 72 hours

5 malicious Rust crates and AI bots exploit CI/CD pipelines to steal developer secrets

Google and Tesla think we’re managing the power grid all wrong

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.