Article Details
Scrape Timestamp (UTC): 2025-09-06 14:18:24.622
Original Article Text
Click to Toggle View
AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack. Investigations into the Nx "s1ngularity" NPM supply chain attack have unveiled a massive fallout, with thousands of account tokens and repository secrets leaked. According to a post-incident evaluation by Wiz researchers, the Nx compromise has resulted in the exposure of 2,180 accounts and 7,200 repositories across three distinct phases. Wiz also stressed that the incident's scope of impact remains significant, as many of the leaked secrets remain valid, and so the effect is still unfolding. The Nx "s1ngularity" supply chain attack Nx is a popular open-source build system and monorepo management tool, widely used in enterprise-scale JavaScript/TypeScript ecosystems, having over 5.5 million weekly downloads on the NPM package index. On August 26, 2025, attackers exploited a flawed GitHub Actions workflow in the Nx repository to publish a malicious version of the package on NPM, which included a post-install malware script ('telemetry.js'). The telemetry.js malware is a credential stealer targeting Linux and macOS systems, which attempted to steal GitHub tokens, npm tokens, SSH keys, .env files, crypto wallets, and upload the secrets to public GitHub repositories named "s1ngularity-repository." What made this attack stand out was that the credential-stealer to used installed command-line tools for artificial intelligence platforms, such as Claude, Q, and Gemini, to search for and harvest sensitive credentials and secrets using LLM prompts. Wiz reports that the prompt changed over each iteration of the attack, showing that the threat actor was tuning the prompt for better success. "The evolution of the prompt shows the attacker exploring prompt tuning rapidly throughout the attack. We can see the introduction of role-prompting, as well as varying levels of specificity on techniques," explained Wiz. "These changes had a concrete impact on the success of the malware. The introduction of the phrase “penetration testing”, for example, was concretely reflected in LLM refusals to engage in such activity." A massive blast radius In the first phase of the attack, between August 26 and 27, the backdoored Nx packages directly impacted 1,700 users, leaking over 2,000 unique secrets. The attack also exposed 20,000 files from infected systems. GitHub responded by taking down the repositories the attacker created after eight hours, but the data had already been copied. Between August 28 and 29, which Wiz defines as phase 2 of the incident, the attackers used the leaked GitHub tokens to flip private repositories to public, renaming them to include the 's1ngularity' string. This has resulted in the further compromise of another 480 accounts, the majority of which were organizations, and the public exposure of 6,700 private repositories. In the third phase, which began on August 31, the attackers targeted a single victim organization, utilizing two compromised accounts to publish an additional 500 private repositories. Nx's response The Nx team published a detailed root cause analysis on GitHub explaining that the compromise came from a pull request title injection combined with the insecure use of pull_request_target. This allowed the attackers to run arbitrary code with elevated permissions, which in turn triggered Nx's publish pipeline and exfiltrated the npm publishing token. The malicious packages were removed, the compromised tokens were revoked and rotated, and two-factor authentication has been adopted across all publisher accounts. To prevent a recurrence of such a compromise, the Nx project has now adopted NPM's Trusted Publisher model, which eliminates token-based publishing, and added manual approval for PR-triggered workflows. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
The "s1ngularity" attack on GitHub exploited a flawed workflow, affecting 2,180 accounts and exposing 7,200 repositories, with significant ongoing impacts due to valid leaked secrets.
Attackers leveraged a malicious version of the Nx package, widely used in JavaScript/TypeScript ecosystems, to deploy credential-stealing malware targeting Linux and macOS systems.
The malware utilized AI platforms to harvest sensitive credentials, including GitHub tokens, npm tokens, SSH keys, and crypto wallets, showcasing advanced prompt-tuning techniques.
GitHub responded by removing malicious repositories within eight hours, yet substantial data had already been exfiltrated, affecting both individual and organizational accounts.
The attack unfolded in three phases, with private repositories being flipped to public, exposing additional accounts and repositories, further expanding the attack's reach.
Nx's root cause analysis identified a pull request title injection vulnerability, leading to token exfiltration; they have since implemented enhanced security measures, including two-factor authentication.
The incident underscores the evolving threat landscape, where AI-driven malware presents heightened risks, necessitating robust security practices and proactive threat mitigation strategies.