<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Supply-Chain Attack — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/supply-chain-attack/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 04 Apr 2026 20:30:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/supply-chain-attack/feed.xml" rel="self" type="application/rss+xml"/><item><title>Axios npm Package Compromised via Social Engineering</title><link>https://feed.craftedsignal.io/briefs/2026-04-axios-npm-hack/</link><pubDate>Sat, 04 Apr 2026 20:30:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-axios-npm-hack/</guid><description>North Korean threat actors (UNC1069) compromised the Axios npm package by socially engineering a maintainer with a fake Microsoft Teams update delivering a RAT, leading to the injection of a malicious dependency and a supply chain attack.</description><content:encoded><![CDATA[<p>On April 4, 2026, the maintainers of the Axios HTTP client disclosed a social engineering attack targeting one of their developers. The attack, attributed to the North Korean threat actor UNC1069, involved impersonating a legitimate company to build trust with the targeted developer. The attacker used a fake Microsoft Teams update disguised as a critical error fix to deploy a remote access trojan (RAT). This RAT allowed the attackers to gain access to the developer&rsquo;s system and npm credentials. The attackers then published two malicious versions of Axios (1.14.1 and 0.30.4) to the npm package registry. These malicious versions included a dependency called plain-crypto-js, which installed a RAT on macOS, Windows, and Linux systems. These versions were available for three hours, posing a supply chain risk to any systems that installed them during that period.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target developer and initiates contact via LinkedIn/Slack, impersonating a legitimate company.</li>
<li>The attacker invites the developer to a Slack workspace populated with fake profiles and staged company activity.</li>
<li>A meeting is scheduled on Microsoft Teams, during which a fake &ldquo;RTC Connection&rdquo; error message is displayed.</li>
<li>The attacker prompts the developer to install a &ldquo;Teams update&rdquo; to resolve the error.</li>
<li>The fake update is a RAT malware, granting the attacker remote access to the developer&rsquo;s machine.</li>
<li>The attacker steals the developer&rsquo;s npm credentials, bypassing MFA due to already authenticated session.</li>
<li>The attacker publishes malicious versions of the Axios package (1.14.1 and 0.30.4) to the npm registry, injecting the plain-crypto-js dependency.</li>
<li>Systems installing the compromised Axios versions download and execute the plain-crypto-js package, resulting in RAT deployment and credential theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the Axios npm package created a supply chain attack impacting an unknown number of systems across various sectors. Systems that installed the malicious versions (1.14.1 and 0.30.4) within the three-hour window are considered compromised. Successful exploitation results in the installation of a remote access trojan (RAT) capable of stealing credentials, browser data, and other sensitive information from macOS, Windows, and Linux systems. This can lead to further unauthorized access, data breaches, and potential financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for the presence of the plain-crypto-js dependency, particularly in projects that use Axios versions 1.14.1 or 0.30.4.</li>
<li>Implement multi-factor authentication (MFA) for npm accounts and other developer accounts, but recognize that authenticated sessions can be hijacked.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious NPM Package Installation&rdquo; to detect potentially malicious package installations based on unusual parent processes (see below).</li>
<li>Block the domain associated with the malicious dependency plain-crypto-js at the DNS resolver.</li>
<li>Educate developers about social engineering tactics and the risks of installing software from untrusted sources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply chain attack</category><category>npm</category><category>social engineering</category><category>rat</category><category>unc1069</category></item><item><title>TrueConf Zero-Day Exploitation Leading to Arbitrary Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-trueconf-zero-day/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-trueconf-zero-day/</guid><description>Hackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf conference servers to execute arbitrary files on connected endpoints, potentially deploying the Havoc C2 framework.</description><content:encoded><![CDATA[<p>A threat actor, possibly with Chinese nexus, is exploiting CVE-2026-3502, a zero-day vulnerability in TrueConf versions 8.1.0 through 8.5.2. This vulnerability allows attackers to replace legitimate software updates with malicious variants, leading to arbitrary code execution on connected clients. The attacks, tracked as &ldquo;TrueChaos&rdquo; since the beginning of 2026, have targeted government entities in Southeast Asia. TrueConf, a video conferencing platform popular among military forces, government agencies, oil and gas corporations, and air traffic management companies, saw increased adoption during the COVID-19 pandemic. The attacker exploits the lack of integrity check in the update mechanism to deliver malware disguised as a legitimate TrueConf update. A fix was released in version 8.5.3 in March 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains control of an on-premises TrueConf server.</li>
<li>The attacker replaces the expected update package with a malicious executable file.</li>
<li>The compromised TrueConf server distributes the malicious update to connected clients.</li>
<li>Clients trust the server-provided update without proper validation and download the malicious file.</li>
<li>The malicious file is executed under the guise of a legitimate TrueConf update, initiating DLL sideloading.</li>
<li>Reconnaissance tools such as tasklist and tracert are deployed.</li>
<li>Privilege escalation is attempted using UAC bypass via iscsicpl.exe.</li>
<li>Persistence is established, and network traffic indicates potential deployment of the Havoc C2 framework for further command execution and payload delivery.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-3502 allows attackers to execute arbitrary code on all TrueConf clients connected to a compromised server. This can lead to widespread malware infections, data theft, and potential compromise of sensitive systems, especially in sectors like government, military, and critical infrastructure that heavily rely on TrueConf for secure communications. The number of affected organizations is potentially high, considering that over 100,000 organizations transitioned to TrueConf during the COVID-19 pandemic.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade TrueConf servers to version 8.5.3 or later to patch CVE-2026-3502.</li>
<li>Monitor for the presence of <code>poweriso.exe</code> or <code>7z-x64.dll</code> on endpoints, as these are strong indicators of compromise.</li>
<li>Investigate systems with suspicious artifacts like <code>%AppData%\Roaming\Adobe\update.7z</code> or <code>iscsiexe.dll</code>.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious TrueConf Update Execution&rdquo; to detect malicious updates executing from the TrueConf directory.</li>
<li>Monitor network traffic for connections to known Havoc C2 infrastructure.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>trueconf</category><category>zero-day</category><category>cve-2026-3502</category><category>supply-chain attack</category></item><item><title>TeamPCP Backdoors Telnyx PyPI Package with Steganographic Malware</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-telnyx/</link><pubDate>Sat, 28 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-telnyx/</guid><description>The TeamPCP threat actor compromised the Telnyx PyPI package, injecting credential-stealing malware hidden within WAV audio files to target Linux, macOS, and Windows systems.</description><content:encoded><![CDATA[<p>On March 27, 2026, the Telnyx package on the Python Package Index (PyPI) was compromised by the threat actor TeamPCP. Malicious versions 4.87.1 and 4.87.2 were uploaded, containing credential-stealing malware concealed within WAV audio files. This supply-chain attack targeted developers using the Telnyx Python SDK, a popular package with over 740,000 monthly downloads, used for integrating communication services into applications. The malicious code resides in the <code>telnyx/_client.py</code> file and executes upon import. The compromise is believed to have originated from stolen credentials for the publishing account on the PyPI registry. TeamPCP has been linked to previous supply-chain attacks and wiper campaigns against Iranian systems, highlighting the group&rsquo;s focus on disrupting software development and infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>TeamPCP gains unauthorized access to the Telnyx PyPI account, likely through credential theft.</li>
<li>Malicious versions 4.87.1 and 4.87.2 of the Telnyx package are published to PyPI.</li>
<li>When a developer installs the compromised Telnyx package, the <code>telnyx/_client.py</code> file is executed upon import.</li>
<li>On Linux and macOS, a detached process is spawned to download a second-stage payload disguised as a WAV audio file (<code>ringtone.wav</code>) from a remote command-and-control (C2) server.</li>
<li>Steganography is used to hide malicious code within the WAV file&rsquo;s data frames.</li>
<li>The embedded payload is extracted using an XOR-based decryption routine and executed in memory.</li>
<li>The malware harvests sensitive data, including SSH keys, credentials, cloud tokens, cryptocurrency wallets, and environment variables.</li>
<li>If Kubernetes is present, the malware enumerates cluster secrets and deploys privileged pods to access underlying host systems. On Windows, a different WAV file (<code>hangup.wav</code>) is downloaded that extracts and saves an executable named <code>msbuild.exe</code> to the startup folder for persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply chain attack could result in widespread compromise of systems utilizing the Telnyx Python SDK. Over 740,000 monthly downloads indicate a large potential victim pool. Stolen credentials and secrets can lead to unauthorized access to cloud resources, sensitive data exfiltration, and further lateral movement within compromised networks. For systems running Kubernetes, the attacker could gain control over the entire cluster, leading to significant disruption and data loss. Developers who installed the malicious packages are advised to consider their systems fully compromised and rotate all secrets as soon as possible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify and remove Telnyx versions 4.87.1 and 4.87.2 from all environments, reverting to version 4.87.0 as recommended by the vendor.</li>
<li>Monitor network connections for processes spawned by Python interpreters (<code>python.exe</code>, <code>python3</code>) attempting to download files with the <code>.wav</code> extension, using the &ldquo;Detect Suspicious Python WAV Download&rdquo; Sigma rule provided below.</li>
<li>Implement stricter controls and multi-factor authentication for PyPI accounts used to publish packages to prevent similar supply chain attacks.</li>
<li>Deploy the &ldquo;Detect msbuild.exe in Startup Folder&rdquo; Sigma rule to identify potential persistence attempts on Windows systems.</li>
<li>Rotate all secrets and credentials on any system that has imported the malicious Telnyx package.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply chain attack</category><category>pypi</category><category>credential theft</category><category>steganography</category></item></channel></rss>