• About Us
  • Announce
  • Privacy Policy
  • Contact us
MasterTrend News
  • HOME
    • BLOG
  • Tutorials
  • Hardware
  • Gaming
  • Mobile
  • Security
  • Windows
  • IA
  • Software
  • Networks
  • What's new
  • en_USEnglish
    • es_ESSpanish
    • pt_BRPortuguese
    • fr_FRFrench
    • it_ITItalian
    • de_DEGerman
    • ko_KRKorean
    • jaJapanese
    • zh_CNChinese
    • ru_RURussian
    • thThai
    • pl_PLPolish
    • tr_TRTurkish
    • id_IDIndonesian
    • hi_INHindi
    • arArabic
    • sv_SESwedish
    • nl_NLDutch
No result
See all results
  • HOME
    • BLOG
  • Tutorials
  • Hardware
  • Gaming
  • Mobile
  • Security
  • Windows
  • IA
  • Software
  • Networks
  • What's new
  • en_USEnglish
    • es_ESSpanish
    • pt_BRPortuguese
    • fr_FRFrench
    • it_ITItalian
    • de_DEGerman
    • ko_KRKorean
    • jaJapanese
    • zh_CNChinese
    • ru_RURussian
    • thThai
    • pl_PLPolish
    • tr_TRTurkish
    • id_IDIndonesian
    • hi_INHindi
    • arArabic
    • sv_SESwedish
    • nl_NLDutch
No result
See all results
MasterTrend News
No result
See all results
Start Security

S1ngularity filtering: 2,180 accounts and 7,200 repos.

MasterTrend Insights by MasterTrend Insights
7 November 2025
in Security
Reading time:4 min read
To To
0
s1ngularity leak - GitHub logo on a red background; security alert for the s1ngularity leak affecting GitHub and NPM and putting developer repositories at risk.

s1ngularity leak: GitHub and NPM affected. Cyberattack could compromise repositories and packages; revoke tokens, verify commits, and update dependencies with 2FA to protect your projects.

10
SHARED
28
Views
Share on FacebookShare on Twitter

Contents

  1. S1ngularity leak: GitHub and NPM affected 🚨
  2. The Nx Supply Chain Attack ⚠️🚀
    1. Compromise vector and incident date 📅
    2. How telemetry.js malware works 🕵️‍♂️
  3. Impact range: damage radius and phases 📈🔥
  4. Nx Project Response and Mitigation 🔧✅
    1. Quick tips and key points ✏️
    2. Defining Snippets and FAQs ✨
    3. Related Posts

S1ngularity leak: GitHub and NPM affected 🚨

GitHub — illustration related to token and secret leak

Recent investigations into the supply chain attack dubbed "s1ngularity" against Nx reveal a massive credential leak: thousands of account tokens and repository secrets were exposed, with repercussions across multiple phases of the incident. A post-incident report from Wiz documents the scope and provides insight into how the exfiltration evolved and its impact. 🚨📊

According to the assessment published by Wiz researchers, the breach resulted in the exposure of 2,180 accounts and 7,200 repositories in three distinct phases, with many secrets still valid and risk of continued damageThe white paper provides details on the timeline, the attacker's techniques, and the nature of the leaked secrets. 🔍📈

The Nx Supply Chain Attack ⚠️🚀

Nx is an open-source, single-repository build and management system widely used in enterprise-scale JavaScript/TypeScript ecosystems. With millions of weekly downloads on the NPM registry, a compromised package has a far-reaching impact on numerous integrations and development pipelines. ⚙️

Compromise vector and incident date 📅

On August 26, 2025, the attacker exploited a vulnerable GitHub Actions workflow in the Nx repository to publish a malicious version of the package to NPM. The package included a malicious post-install script named "telemetry.js" that acted as credential-extractor malware on affected systems. 🔥

How telemetry.js malware works 🕵️‍♂️

The telemetry.js malware acted as a credential thief in Linux and macOS, attempting to steal GitHub tokens, npm tokens, SSH keys, .env files, cryptocurrency wallets, and other secrets, then uploading them to public GitHub repositories named "s1ngularity-repository". This pattern allowed the attacker to centralize and expose the stolen information. 🔐

Prompt LLM used to find and steal credentials and secrets
Prompt LLM to find and exfiltrate credentials and other secrets
Source: Wiz

The attacker also integrated command-line tools for AI platforms (e.g., Claude, Q, and Gemini) to automate search and harvesting using targeted prompts. Wiz documents how the prompt evolved during the attack, optimizing extraction and circumventing model rejections for certain instructions, reflecting the actor's active attunement to LLM techniques. ✨💡

Impact range: damage radius and phases 📈🔥

The incident unfolded in three phases. In the first, between August 26 and 27, compromised versions of Nx directly affected 1,700 users and leaked more than 2,000 unique secrets, in addition to exposing around 20,000 files from infected systems. GitHub intervened, but much of the data had already been duplicated.

  • 🔹 Phase 1 (August 26–27): 1,700 users affected, ~2,000 leaked secrets, 20,000 compromised files.
  • 🔸 Phase 2 (August 28–29): Using leaked tokens to convert private repositories to public ones; 480 additional accounts compromised and 6,700 repositories exposed.
  • 🔹 Phase 3 (from August 31): attack targeting a victim organization using accounts compromised to publish 500 more private repositories.

During the second phase, the attackers used stolen GitHub tokens to make private repositories public and rename them with the string 's1ngularity,' amplifying the exposure. In the third phase, a specific target was exploited to publish hundreds of additional private repositories, demonstrating the attacker's persistence and escalation. 🎯

Overview of the attack and its impact
Visual summary of the s1ngularity attack
Source: Wiz

Nx Project Response and Mitigation 🔧✅

The Nx team published a root cause analysis on GitHub explaining how an injection in the title of a pull request combined with insecure use of pull_request_target allowed arbitrary code to be executed with elevated permissions, triggering the publishing pipeline and facilitating the exfiltration of the npm publishing token. 🛠️

The actions implemented included removing malicious packages, revoking and rotating compromised tokens, and mandating two-factor authentication for all publisher accounts. Additionally, Nx adopted NPM's Trusted Publisher model and added manual approval for PR-triggered workflows. 🔐📌

Quick tips and key points ✏️

  • ✅ Review and rotate tokens and secrets immediately if compromise is suspected.
  • 📌 Avoid unsafe use of pull_request_target and enforce manual approvals on sensitive flows.
  • 🔧 Implement multi-factor authentication and trusted publishing models like Trusted Publisher.
  • ⚡ Monitor public repositories and perform automated secret searches for early detection.

Defining Snippets and FAQs ✨

What is telemetry.js?

telemetry.js is the name of the malicious post-install script included in the compromised version of the Nx package; it acted as a credential stealer on Linux and macOS systems to harvest and exfiltrate secrets to public repositories controlled by the attacker. 🔍

How many accounts and repositories were affected?

According to Wiz's report, the attack exposed 2,180 accounts and 7,200 repositories throughout the three documented phases of the incident, with many secrets still valid and a risk of continued impact. 📊

461 TP3T environments had compromised passwords, nearly double the 251 TP3T the previous year. Get the Picus Blue Report 2025 for a complete analysis of data exfiltration prevention, detection, and trends. 📈

The report provides metrics, recommendations, and case studies to strengthen defenses and improve response to secret leaks.

Share this:
FacebookLinkedInPinterestXRedditTumblrBlueskyThreadsShareChatGPTClaudeGoogle AIGrok

Related Posts

  • Event ID 1001 Error: Easy fix now! ⚡
  • AI Privacy: Disable Gemini and Copilot in 1 click 🔒
  • AI Agents: How They're Transforming Your Business Today 💡⚡
  • Microsoft Majorana 1: Revolutionizing quantum computing! 🚀
  • ChatBIT: The New Frontier of Chinese Military AI
  • 🔥 Hot Raspberry Pi: Avoid Damage With This Trick ⚠️
  • Install Windows 11 Home without Internet
  • Windows 11 Backup: Avoid losses now! ⚠️✨
Tags: CybersecurityEvergreenContentMalware
Previous Publication

Graphics driver optimization: +40% FPS with a single update.

next post

How to find out what's slowing down Windows on your PC: Check it now.

MasterTrend Insights

MasterTrend Insights

Our editorial team shares a deep-dive analysis, tutorials and recommendations for getting the most out of your devices and digital tools.

RelatedPublications

Remove Hotcleaner.com in one click and protect Chrome: woman using PC with Google Chrome logo and security warning on screen.
Security

Hotcleaner.com: Discover and remove the extension 🔥🔧

November 19, 2025
60
Virus MEMZ - Woman using a laptop showing a red virus alert screen, illustrating MEMZ virus malware infection warning and cybersecurity threat on a Windows PC.
Security

MEMZ Virus: 3 tricks to stop the damage now! ⚠️

November 2, 2025
80
Secure WhatsApp: WhatsApp logo secured with a chain and padlock, symbol of security, encryption and privacy to protect chats with two-step verification.
Security

Protect WhatsApp: 5 quick steps to avoid being spied on 🔒

October 16, 2025
72
Lock Mode on iOS - Illustration of Lock Mode on iOS: password field with asterisks and padlock, fingerprint and shield symbols, highlighting security and privacy on iPhone.
Security

Lock Mode on iOS: Activate it NOW and protect your iPhone

8 October 2025
24
Controlled Folder Access: Ransomware protection on Windows; laptop with "RANSOMWARE" warning and a green icon indicating unauthorized changes are blocked.
Security

Controlled Folder Access: Protect files NOW ⚠️

October 2, 2025
21
Alternatives to incognito mode - Woman using laptop with browser in incognito mode, looking for private browsing alternatives: VPN and secure browsers.
Security

Alternatives to incognito mode: Protect your privacy NOW!

September 7, 2025
80
next post
How to find out what's slowing down Windows on your PC - Woman using a laptop with an alert signal, investigating how to find out what's slowing down Windows on her PC to fix the slowness and optimize performance.

How to find out what's slowing down Windows on your PC: Check it now.

5 1 vote
Article Rating
Subscribe
Access
Notify of
guest
guest
0 Comments
Oldest
Newest Most voted
Online Comments
See all comments

Stay Connected

  • 976 Fans
  • 118 Followers
  • 1.4 k Followers
  • 1.8 k Subscribers

Do not miss the latest in technology and gaming.
Tips unique, practical guides and analysis every day.

Subscription Form
  • Trends
  • Comments
  • Last
How to add clock on the Windows desktop 11: ¡3 tricks infallible!

How to add clock on the Windows desktop 11: Get more in minutes! ⏱️

1 May 2025
How to save game in REPO

How to save game in REPO 🔥 Discover the secret to not losing progress

7 July 2025
12 Best Alternatives to Lucky this program for Android

Alternatives to Lucky this program: the 12 apps best and easy! 🎮⚡

13 November 2025
🖥️ How to open 'Devices and printers' in Windows 11: 4 simple steps

🌟 How to open ‘Devices and printers’ in Windows 11: ¡Amazing trick!

November 20, 2025
Features of Gmail on Android: Save time with 5 tips

Features of Gmail in Android: you 5 tricks you did not know! 📱✨

12
Repair of motherboards - Repair MotherBoards

Repair of motherboards of Laptops

10
Install Windows 11 Home without Internet

Install Windows 11 Home without Internet

10
How to backup drivers in Windows 11/10 in 4 steps!

How to backup drivers in Windows 11/10 It Prevents errors! 🚨💾

10
Protect ZIP - Woman using a laptop to password-protect a compressed file, an example of how to protect a ZIP file with fast encryption and data security methods.

Protect ZIP files. The easiest way to secure your data today ⚡

November 26, 2025
Wolf Statues - Set of pink wolf statues glowing on pedestals in a ruined and vegetated area of ​​Doom, showing the location of all wolf statues in Doom The Ancient Gods.

Wolf Statues: A quick trick for 100% completion that few use ⚡🐺 in Doom: The Dark Ages

November 25, 2025
Background App Refresh. A young woman in a classroom is showing on her iPhone the "Background App Refresh" option enabled in the app settings.

Background Update Activate it well and speed up your iPhone 🚀

November 23, 2025
Restart Windows Explorer - Woman restarting Windows Explorer from Task Manager in Windows to fix system errors in seconds.

Restart Windows Explorer: A Quick Trick That Saves Your PC ⚡

November 21, 2025

Recent News

Protect ZIP - Woman using a laptop to password-protect a compressed file, an example of how to protect a ZIP file with fast encryption and data security methods.

Protect ZIP files. The easiest way to secure your data today ⚡

November 26, 2025
87
Wolf Statues - Set of pink wolf statues glowing on pedestals in a ruined and vegetated area of ​​Doom, showing the location of all wolf statues in Doom The Ancient Gods.

Wolf Statues: A quick trick for 100% completion that few use ⚡🐺 in Doom: The Dark Ages

November 25, 2025
67
Background App Refresh. A young woman in a classroom is showing on her iPhone the "Background App Refresh" option enabled in the app settings.

Background Update Activate it well and speed up your iPhone 🚀

November 23, 2025
84
Restart Windows Explorer - Woman restarting Windows Explorer from Task Manager in Windows to fix system errors in seconds.

Restart Windows Explorer: A Quick Trick That Saves Your PC ⚡

November 21, 2025
151
MasterTrend News logo

MasterTrend Info is your source of reference in technology: discover news, tutorials, and analysis of hardware, software, gaming, mobile, and artificial intelligence. Subscribe to our newsletter and don't miss any trend.

Follow us

Browse by Category

  • Gaming
  • Hardware
  • IA
  • Mobile
  • What's new
  • Networks
  • Security
  • Software
  • Tutorials
  • Windows
Add-as-a-preferred-source-on-Google

Recent News

Protect ZIP - Woman using a laptop to password-protect a compressed file, an example of how to protect a ZIP file with fast encryption and data security methods.

Protect ZIP files. The easiest way to secure your data today ⚡

November 26, 2025
Wolf Statues - Set of pink wolf statues glowing on pedestals in a ruined and vegetated area of ​​Doom, showing the location of all wolf statues in Doom The Ancient Gods.

Wolf Statues: A quick trick for 100% completion that few use ⚡🐺 in Doom: The Dark Ages

November 25, 2025
  • About Us
  • Announce
  • Privacy Policy
  • Contact us

Copyright © 2025 https://mastertrend.info/ - All rights reserved. All trademarks are property of their respective owners.

We've detected you might be speaking a different language. Do you want to change to:
es_ES Spanish
es_ES Spanish
en_US English
pt_BR Portuguese
fr_FR French
it_IT Italian
ru_RU Russian
de_DE German
zh_CN Chinese
ko_KR Korean
ja Japanese
th Thai
hi_IN Hindi
ar Arabic
tr_TR Turkish
pl_PL Polish
id_ID Indonesian
nl_NL Dutch
sv_SE Swedish
Change Language
Close and do not switch language
No result
See all results
  • en_USEnglish
    • es_ESSpanish
    • pt_BRPortuguese
    • fr_FRFrench
    • it_ITItalian
    • de_DEGerman
    • ko_KRKorean
    • jaJapanese
    • zh_CNChinese
    • ru_RURussian
    • pl_PLPolish
    • id_IDIndonesian
    • tr_TRTurkish
    • hi_INHindi
    • thThai
    • arArabic
    • sv_SESwedish
    • nl_NLDutch
  • Gaming
  • Hardware
  • IA
  • Mobile
  • What's new
  • Networks
  • Security
  • Software
  • Tutorials
  • Windows

Copyright © 2025 https://mastertrend.info/ - All rights reserved. All trademarks are property of their respective owners.

wpDiscuz
RedditBlueskyXMastodonHacker News
Share this:
MastodonVKWhatsAppTelegramSMSLineMessengerFlipboardHacker NewsMixNextdoorPerplexityXingYummly
Your Mastodon Instance