In June 2023, Phylum was the first to unearth a series of suspicious npm publications belonging to what appeared to be a highly targeted attack. The identified packages, published in pairs, required installation in a specific sequence, subsequently retrieving a token that facilitated the download of a final malicious payload from a remote server. A recent security alert from GitHub publicly attributes this cyber-attack—which they were investigating independently—to threat actors with strong ties to North Korean objectives. The GitHub Security AlertOn July 18, 2023 GitHub posted a security alert on their blog, sharing further insights into this attack, which they had been collaboratively investigating with npm, their subsidiary. They described it as a "low-volume social engineering campaign that targets the personal accounts of employees of technology firms." Additionally, they went on to say the following, We assess with high confidence that this campaign is associated with a group operating in support of North Korean objectives, known as Jade Sleet by Microsoft Threat Intelligence and TraderTraitor by the U.S
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.
The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
BotScout.com provides proactive bot detection, screening, and banning through a powerful API.
Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.
Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.