Open-source supply-chain attack steals credentials via poisoned package

TL;DR Summary
Attackers exploited a GitHub Actions workflow to gain access to signing keys and credentials, publishing a malicious element-data 0.23.3 package that scanned environments for sensitive data; the package was removed within ~12 hours, credentials rotated, and users are urged to upgrade to 0.23.4, purge caches, and rotate any exposed secrets.
Reading Insights
Total Reads
0
Unique Readers
3
Time Saved
4 min
vs 5 min read
Condensed
94%
882 → 50 words
Want the full story? Read the original article
Read on Ars Technica