Skip to content
Threat Feed

Tag

Credential-Theft

35 briefs RSS
high advisory

Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise

A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.

Microsoft Defender for Office 365 phishing credential-theft AiTM token-compromise
2r 2t 2i
critical advisory

Compromised Bitwarden CLI npm Package Enables Credential Theft and Information Exfiltration

A remote attacker can exploit a compromised Bitwarden CLI npm package to steal credentials and exfiltrate sensitive information.

Bitwarden CLI supply-chain credential-theft exfiltration npm
2r 2t
high threat

Increased npm Supply Chain Attacks Targeting SAP Developers

Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.

@bitwarden/cli +6 TeamPCP npm supply-chain credential-theft github
2r 5t 3i
critical advisory

Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials

Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.

pytorch-lightning supply-chain pypi credential-theft malware
2r 2t
high threat

Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption

In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.

Microsoft Defender Storm-1747 email phishing credential-theft Tycoon2FA BEC
2r 1t
critical threat

Mini Shai-Hulud Supply Chain Attack Targets SAP NPM Packages

The Mini Shai-Hulud campaign injected malicious code into SAP NPM packages, targeting credentials and cloud secrets related to SAP Cloud Application Programming (CAP) and SAP cloud deployment workflows, exfiltrating data through public GitHub repositories.

Cloud Application Programming +5 TeamPCP supply-chain npm sap credential-theft
2r 1t
critical threat

Compromised SAP npm Packages Steal Developer Credentials

Multiple official SAP npm packages were compromised via a supply chain attack, likely by TeamPCP, to steal credentials and authentication tokens from developers' systems.

Cloud Application Programming Model +1 TeamPCP supply-chain credential-theft npm
2r 5t
high threat

UNC6692 Combines Social Engineering, Malware, and Cloud Abuse

UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.

Microsoft Teams +1 UNC6692 social-engineering malware cloud-abuse credential-theft lateral-movement
2r 12t
high advisory

AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure

Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.

AWS IAM +1 cloud aws github credential-theft initial-access lateral-movement
2r 2t
high advisory

Malicious Chrome Extensions Stealing Data and Opening Backdoors

A coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.

chrome-extension credential-theft backdoor ad-injection exfiltration
2r 6t
high advisory

SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams

SiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.

siyuan ntlm ssrf credential-theft mermaid
2r 3t 1c
medium advisory

OpenClaw Agent Suspicious Child Process Execution

Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.

ai-agent execution malware credential-theft
2r 10t 3i
high advisory

Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability

A man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.

cve-2026-35560 athena odbc man-in-the-middle mitm credential-theft
2r 1t 1c
critical advisory

Compromised Axios Library Leads to RAT Deployment via @usebruno/cli

Compromised versions of the `axios` npm package introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT), impacting users of `@usebruno/cli` who ran `npm install` between 00:21 UTC and ~03:30 UTC on March 31, 2026, potentially leading to credential exfiltration.

supply-chain npm rat credential-theft
2r 5t 1i
high advisory

DeepLoad Malware Distributed via ClickFix

The DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.

deepload clickfix credential-theft windows
2r 3t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The trivy-action GitHub Action was compromised via git tag repointing, where 76 of 77 release tags were retroactively poisoned, leading to a multi-stage credential theft operation discovered following a spike in script execution detections on Linux runners.

supply-chain github-actions credential-theft
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting malicious code into the entrypoint.sh script to steal credentials from CI/CD pipelines before executing the legitimate Trivy scanner.

supply-chain github-actions credential-theft
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The trivy-action GitHub Action, a widely used vulnerability scanner in CI/CD pipelines, was compromised via git tag repointing to inject a multi-stage credential stealer, affecting 76 of 77 release tags.

supply-chain github-actions credential-theft linux
2r 2t
critical threat

Compromised Telnyx PyPI Package Distributes Credential-Stealing Malware

A threat actor compromised the PyPI package `telnyx`, uploading malicious versions 4.87.1 and 4.87.2 containing credential-stealing malware that exfiltrates data to a C2 server.

TeamPCP supply-chain pypi credential-theft
2r 7t 7i
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.

supply-chain credential-theft github-actions
2r 1t
high advisory

Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.

phishing credential-theft cloud
2r 2t
critical threat

TeamPCP Backdoors Telnyx PyPI Package with Steganographic Malware

The TeamPCP threat actor compromised the Telnyx PyPI package, injecting credential-stealing malware hidden within WAV audio files to target Linux, macOS, and Windows systems.

TeamPCP supply chain attack pypi credential theft steganography
2r 5t
high advisory

Tycoon2FA PhaaS Platform Resurgence After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.

phishing credential-theft MFA-bypass
2r 2t 1i
high advisory

Tycoon2FA Phishing-as-a-Service Resurgence After Takedown

The Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.

phishing credential-theft MFA-bypass phishing-as-a-service
2r 2t 1i
critical advisory

Compromised trivy-action GitHub Action Enables Credential Theft

The trivy-action GitHub Action was compromised via git tag repointing, with attackers poisoning 76 of 77 release tags to inject a multi-stage credential stealer before the legitimate scanner runs, granting attackers access to CI/CD pipeline secrets.

supply-chain credential-theft github-actions
2r 1t
high advisory

UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)

UniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.

unifi mitm credential-theft cve-2019-25652
2r 2t
critical advisory

Malicious LiteLLM Versions Harvest Credentials

Compromised versions of the LiteLLM package (1.82.7 and 1.82.8) on PyPI contained malware designed to harvest sensitive credentials and files, exfiltrating them to a remote API, impacting users who installed and ran the package.

supply-chain malware credential-theft
2r 2t
critical advisory

LiteLLM Package Compromised with Credential-Stealing Code via Trivy

The LiteLLM package was compromised and infected with credential-stealing code through a supply chain attack leveraging the Trivy vulnerability scanner.

supply-chain credential-theft llm trivy
2r 1t
critical advisory

GlassWorm Supply Chain Attack Using Unicode Encoding and Credential Theft

The GlassWorm campaign employs Unicode variation selectors to conceal malicious code within supply chain artifacts, subsequently querying a Solana wallet for C2 URLs and exfiltrating sensitive credentials.

supply-chain credential-theft unicode-encoding
2r 4t
high advisory

Crunchyroll Data Breach via Telus Supply Chain Compromise

Crunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.

supply-chain data-breach credential-theft phishing
2r 3t 1i
high advisory

GhostLoader Malware Targeting macOS via GitHub and AI Workflows

GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.

github malware macos credential-theft ai
2r 1t
high threat

VoidStealer Steals Secrets by Debugging Chrome

VoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.

VoidStealer credential-theft chrome debugging
2r 1t
high advisory

Unscoped API Keys in AI Agent Frameworks

A research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.

ai-agent api-key authorization credential-theft
2r 1t 2i
high advisory

Azure Identity Protection Atypical Travel Anomaly

The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.

Azure Active Directory +1 azure identity-protection atypical-travel account-compromise credential-theft
2r 1t
high advisory

NTDS or SAM Database File Copied

Detects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.

Microsoft Defender XDR +2 credential-access windows ntds sam credential-theft
2r 1t