Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

Posted on September 23, 2025September 23, 2025 By CWS

Sep 23, 2025Ravie LakshmananSupply Chain Assault / Malware
GitHub on Monday introduced that it is going to be altering its authentication and publishing choices “within the close to future” in response to a current wave of provide chain assaults concentrating on the npm ecosystem, together with the Shai-Hulud assault.
This contains steps to deal with threats posed by token abuse and self-replicating malware by permitting native publishing with required two-factor authentication (2FA), granular tokens that can have a restricted lifetime of seven days, and trusted publishing, which allows the power to securely publish npm packages instantly from CI/CD workflows utilizing OpenID Join (OIDC).
Trusted publishing, moreover eliminating the necessity for npm tokens, establishes cryptographic belief by authenticating every publish utilizing short-lived, workflow-specific credentials that can’t be exfiltrated or reused. Much more considerably, the npm CLI mechanically generates and publishes provenance attestations for the package deal.
“Each package deal revealed through trusted publishing contains cryptographic proof of its supply and construct setting,” GitHub famous again in late July 2025. “Your customers can confirm the place and the way your package deal was constructed, growing belief in your provide chain.”

To assist these modifications, the Microsoft-owned firm mentioned it is going to be enacting the next steps –

Deprecate legacy basic tokens.
Deprecate time-based one-time password (TOTP) 2FA, migrating customers to FIDO-based 2FA.
Restrict granular tokens with publishing permissions to a shorter expiration.
Set publishing entry to disallow tokens by default, encouraging utilization of trusted publishers or 2FA-enforced native publishing.
Take away the choice to bypass 2FA for native package deal publishing.
Develop eligible suppliers for trusted publishing.

The event comes per week after a provide chain assault codenamed Shai-Hulud injected a self-replicating worm into a whole bunch of npm packages that scanned developer machines for delicate secrets and techniques and transmitted them to an attacker-controlled server.
“By combining self-replication with the aptitude to steal a number of kinds of secrets and techniques (and never simply npm tokens), this worm may have enabled an limitless stream of assaults had it not been for well timed motion from GitHub and open supply maintainers,” GitHub’s Xavier René-Corail mentioned.

Npm Bundle Contains QR Code-Based mostly
The disclosure comes as software program provide chain safety firm Socket mentioned it recognized a malicious npm package deal named fezbox that is able to harvesting browser passwords utilizing a novel steganographic approach. The package deal is now not obtainable for obtain from npm. It attracted a complete of 476 downloads because it was first revealed on August 21, 2025.
“On this package deal, the menace actor (npm alias janedu; registration e mail janedu0216@gmail[.]com) executes a payload inside a QR code to steal username and password credentials from net cookies, throughout the browser,” safety researcher Olivia Brown mentioned.

Fezbox claims to be a JavaScript utility consisting of widespread helper capabilities. However, in actuality, it harbors stealthy code to fetch a QR code from a distant URL, parse the QR code, and execute the JavaScript payload contained inside that URL.
The payload, for its half, makes an attempt to learn doc.cookie, extracts username and password data from the cookie, and transmits the knowledge to an exterior server (“my-nest-app-production>.up.railway[.]app”) through an HTTPS POST request.
“Most functions now not retailer literal passwords in cookies, so it is tough to say how profitable this malware can be at its purpose,” Brown famous. “Nonetheless, the usage of a QR code for additional obfuscation is a inventive twist by the menace actor. This system demonstrates how menace actors proceed to enhance their obfuscation strategies and why having a devoted software to examine your dependencies is extra vital than ever.”

The Hacker News Tags:2FA, Chain, GitHub, Mandates, NPM, Security, ShortLived, Strengthen, Supply, Tokens

Post navigation

Previous Post: Automotive Titan Stellantis Discloses Data Breach
Next Post: Hackers Abusing GitHub Notifications to Deliver Phishing Emails

Related Posts

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro The Hacker News
U.S. Seizes .74M in Crypto Tied to North Korea’s Global Fake IT Worker Network U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network The Hacker News
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise The Hacker News
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act The Hacker News
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access The Hacker News
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark