The Update: The Australian Cyber Security Centre (ACSC) has issued a high-level alert for all Australian organisations, warning of increased attacks against online code repositories. The agency confirmed that threat actors are actively using phishing, compromised credentials and infected software packages to gain access. Once inside, attackers are observed scanning for and publicly leaking sensitive credentials, migrating private code to public repositories, and modifying software packages to launch supply chain attacks.
The advisory follows a recent large-scale incident where a self-replicating worm, dubbed "Shai-Hulud", compromised more than 180 packages in the popular npm JavaScript repository, demonstrating the speed and scale of these automated threats. The ASD directly stated it is aware of threat actors "abusing legitimate tooling and functions to achieve these results, rather than bespoke tooling", making detection more difficult for security teams who are looking for traditional malware signatures. The alert urges organisations to immediately review logs and validate all software packages.
Why it Matters: The targeting of code repositories represents a fundamental threat to the software supply chain. By compromising these foundational developer tools, attackers can inject malicious code into otherwise legitimate software, which is then distributed and trusted by countless downstream users. This technique bypasses traditional perimeter defences, as the threat originates from a trusted source.
The ACSC's alert signals that organisations can no longer simply trust open-source packages without rigorous verification and must actively hunt for exposed credentials within their development pipelines to prevent a minor security lapse from becoming a catastrophic breach.