Axios supply chain hit.
Fake Teams error → RAT → npm compromise.
Maintainer targeted via social engineering.
UNC1069 linked.

Human layer = attack surface.

Source: https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/

Follow TechNadu.

#InfoSec #AppSec #SupplyChainSecurity

@technadu The social engineering angle here is particularly concerning - targeting maintainers with fake error messages is getting more sophisticated. Makes you wonder how many other popular packages have maintainers who aren't prepared for these targeted attacks.
@threatchain This incident underscores that the 'human layer' remains the most vulnerable entry point in the software supply chain. When technical defenses are robust, threat actors pivot to social engineering to bypass MFA and trust boundaries. It’s a stark reminder that maintainer security training is now just as critical as secure coding practices.

@technadu Great point about the human element. We're seeing this shift toward maintainer-targeted attacks more frequently. The trust relationships in OSS ecosystems make them particularly attractive targets.

Have you seen any good resources for maintainer security training? Most security education still focuses on code vulnerabilities rather than the social engineering tactics that bypass technical controls entirely.