<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Intercom-Client (= 7.0.4) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/intercom-client--7.0.4/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/intercom-client--7.0.4/feed.xml" rel="self" type="application/rss+xml"/><item><title>Compromised intercom-client npm Package Exfiltrates Credentials</title><link>https://feed.craftedsignal.io/briefs/2026-05-npm-intercom-client-compromise/</link><pubDate>Fri, 08 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-npm-intercom-client-compromise/</guid><description>A compromised version (7.0.4) of the intercom-client npm package was published using a compromised developer account, containing obfuscated JavaScript that executed during installation to harvest and exfiltrate credentials from the environment, as part of the 'Mini Shai-Hulud' supply chain campaign.</description><content:encoded><![CDATA[<p>On April 30, 2026, version 7.0.4 of the intercom-client npm package was published using a compromised developer account. This version was not created through Intercom&rsquo;s official build pipeline. The malicious package contained an obfuscated JavaScript payload that was designed to execute upon installation via a <code>preinstall</code> hook. This payload was designed to harvest sensitive credentials from the environment in which it was running, including cloud provider credentials (AWS, GCP, and Azure), environment variables, <code>.env</code> files, GitHub and npm tokens, SSH keys, local configuration files, and cloud metadata service credentials. The stolen credentials were then exfiltrated to attacker-controlled GitHub repositories. The compromised package was available on npm for approximately 2 hours, between 15:00 and 17:00 UTC. This incident is part of the &ldquo;Mini Shai-Hulud&rdquo; supply chain campaign, as tracked by Wiz and Socket. Developers are advised to check their projects for the presence of version 7.0.4 using <code>npm list intercom-client</code> and rotate credentials if found.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a developer account with publishing privileges for the intercom-client npm package.</li>
<li>The attacker publishes a malicious version of the intercom-client package (version 7.0.4) to npm.</li>
<li>The malicious package includes an obfuscated JavaScript payload within a <code>preinstall</code> hook.</li>
<li>When a developer installs the compromised package using <code>npm install intercom-client</code>, the <code>preinstall</code> script automatically executes.</li>
<li>The obfuscated JavaScript payload harvests credentials from the environment, including cloud provider credentials (AWS, GCP, Azure), environment variables, .env files, GitHub and npm tokens, SSH keys, local configuration files, and cloud metadata service credentials.</li>
<li>The harvested data is exfiltrated to attacker-controlled GitHub repositories.</li>
<li>The attacker gains access to the stolen credentials, potentially allowing them to compromise cloud infrastructure, source code repositories, and other sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the intercom-client npm package resulted in the potential theft of sensitive credentials, including cloud provider credentials, API keys, and SSH keys. The impact could include unauthorized access to cloud infrastructure, source code repositories, and other sensitive resources. This attack affects any developer or organization that installed version 7.0.4 of the intercom-client package between 15:00 and 17:00 UTC on April 30, 2026. The long-term consequences depend on the extent to which the stolen credentials are used to further compromise systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Downgrade the intercom-client package to version 7.0.3 or earlier to avoid the compromised version, as mentioned in the <a href="#patches">Patches</a> section.</li>
<li>Immediately rotate all credentials (cloud provider credentials, environment variables, API keys, SSH keys) accessible from any environment where version 7.0.4 was installed, as recommended in the <a href="#workarounds">Workarounds</a> section.</li>
<li>Review CI/CD build logs for any <code>npm install</code> commands that resolved to version 7.0.4 between 15:00 and 17:00 UTC on April 30, 2026, to identify potentially affected systems, as described in the <a href="#workarounds">Workarounds</a> section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious npm Preinstall Script&rdquo; to identify potentially malicious npm package installations based on unusual script execution.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>credential-theft</category><category>npm</category></item></channel></rss>