company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Info Stealer

Data Wiper

loading..
loading..
loading..

Massive npm Supply Chain Attack 60 Malicious Packages Exfiltrate Sensitive Network Data to Discord

Massive npm supply chain attack exposed, 60+ malicious packages steal hostnames, IPs, DNS data, and user paths via Discord webhooks...

24-May-2025
5 min read

No content available.

Related Articles

loading..

Botnet

BADBOX

FBI confirms BADBOX 2.0 botnet infected 1M+ devices across 222 countries. Learn ...

The FBI confirms over 1 million consumer devices have been weaponised in the *BADBOX 2.0 botnet* – a sophisticated malware operation exploiting Chinese-manufactured smart devices to create criminal proxy networks. ### **Global Infection Map: Brazil & U.S. Hit Hardest** *Top 5 Infected Nations:* 1. **Brazil**: 37.62% of infected devices 2. **United States**: 18.21% 3. **Mexico**: 6.32% 4. **Argentina**: 5.31% 5. **Colombia**: 2.70% ### **How BADBOX 2.0 Infects Your Devices: 3 Attack Vectors** 1. **Pre-Installed Malware** Devices manufactured with hidden backdoors in Chinese factories – undetectable to consumers. 2. **Trojanized Firmware Updates** Fake "system updates" inject persistent malware surviving factory resets. 3. **Malicious App Stores** Unofficial marketplaces (e.g., "free streaming" apps) bypass Google Play Protect. ### **74 Confirmed Compromised Device Models** | High-Risk Categories | Example Models | |----------------------|----------------| | **Android TV Boxes** | X96Q, X96Max_Plus2, TX3mini | | **Smart Projectors** | Projector_T6P, LongTV_GN7501E | | **Uncertified Tablets** | KM9PRO, KM6, Q96MAX | | **Streaming Sticks** | Q9 Stick, M8SPROW | | **Budget Smart TVs** | Fujicom-SmartTV, TV008 | ### **Botnet Capabilities: Why the FBI is Warning You** #### Residential Proxy Services Cybercriminals sell access to victims’ home IPs ($0.50-$5/day per IP) to mask: - Banking fraud - Phishing campaigns - Illegal content distribution #### Ad Fraud Operation Hidden processes generate $3M+/month by: - Simulating 20,000+ ad clicks/hour - Faking app installs - Exploiting affiliate programs #### Credential Stuffing Attacks Botnet bypasses geo-blocks and rate limits using residential IPs to test: - 500M+ stolen credentials monthly - Corporate VPN logins - Financial service accounts ### **Critical Mitigation Steps (FBI Recommendations)** *(Numbered list for featured snippet targeting)* 1. **Audit Your Network** Check all IoT devices against the infected model list. Disconnect uncertified Android devices immediately. 2. **Block Unofficial App Stores** Never disable Google Play Protect. Avoid "free streaming" apps like *Mobdro* or *Cinema HD*. 3. **Monitor Traffic Anomalies** Look for suspicious outbound connections to: - 185.225.73[.]25 (Bulgaria) - 154.53.224[.]166 (Germany) - 23.227.196[.]48 (Cloudflare) 4. **Patch Aggressively** Prioritize updates for: - Firewalls - Router firmware - Android security patches > **Expert Tip**: Segment IoT devices on guest networks to limit breach impact. ### **Evolution of a Botnet: BADBOX Timeline** - **2023**: Original BADBOX discovered pre-installed on T95 TV boxes - **Oct 2024**: German BSI disrupts botnet via sinkhole operation - **Mar 2025**: HUMAN discovers 1M+ devices infected in 222 countries - **Jun 2025**: FBI/Google coalition disrupts 500k+ devices in BADBOX 2.0

loading..   06-Jun-2025
loading..   2 min read
loading..

API

Energy giant faces unprecedented cyber escalation as threat actors target API in...

**TotalEnergies** has experienced a catastrophic escalation in cybersecurity incidents, with breaches jumping from **210,715 customer records** in 2024 to an alleged **22.25 million records** offered on dark web markets in 2025‚ representing a staggering **105x increase** in attack scale that highlights critical vulnerabilities in the energy sector’s digital infrastructure. The recent TotalEnergies data breaches underscore systemic API and web application vulnerabilities plaguing critical energy infrastructure. With **API-related security issues costing organisations up to $87 billion annually** and **46% of Account Takeover attacks targeting API endpoints**, TotalEnergies incidents exemplify why automated security solutions are imperative for [energy sector protection](https://www.akamai.com/site/en/documents/white-paper/2025/api-security-study-asia-pacific-2025.pdf). ![TotalEnergies Data Breach Escalation: 105x Increase from 2024 to 2025](https://sb-cms.s3.ap-south-1.amazonaws.com/image_10_40a2deb785.png) ***TotalEnergies Data Breach Escalation: 105x Increase from 2024 to 2025*** ## Critical Timeline Analysis ### Confirmed Incident TotalEnergies Clientes SAU detected unauthorized access to sales management systems on **August 31, 2024**, exposing customer names, contact details, and service information across **210,715 accounts**. The company immediately collaborated with Spanish Police and Data Protection Agency, emphasizing data protection as an "absolute priority" while initiating legal action against perpetrators. ### Dark Web Intelligence Threat actor **"icikevin"** allegedly advertised **22.25 million TotalEnergies Power & Gas records** on underground forums, including names, phone numbers, addresses, energy usage categories, and tariff structures. The dataset was marketed as exclusive to five buyers, indicating high-value commercial exploitation targeting billing portal APIs and customer-facing interfaces. ## Technical Vulnerability Assessment ### Primary Attack Vectors Identified **API Security Gaps**: The dramatic escalation suggests exploitation of **OWASP Top 10 API vulnerabilities**, particularly broken object-level authorization and excessive data exposure. Research indicates **33% of API vulnerabilities are associated with authentication and access control issues**, directly correlating with TotalEnergies breach patterns. **Web Application Weaknesses**: The 2024 sales system compromise exploited authentication mechanisms and access controls in customer-facing platforms. With **68% of organisations failing to implement proper API authentication**, TotalEnergies incidents reflect industry-wide security deficiencies. **Cloud Infrastructure Misconfigurations**: Similar to recent **[Gravy Analytics breaches](https://www.secureblink.com/cyber-security-news/gravy-analytics-hack-millions-location-data-exposed-privacy-at-risk)**, TotalEnergies likely experienced unauthorised access through improperly secured cloud storage or exposed API endpoints, highlighting the risks of rapid digital transformation without adequate security frameworks. ## Energy Sector Under Attack Current intelligence reveals **90% of the world’s largest energy companies suffered cybersecurity breaches in 2023**, with critical infrastructure becoming primary targets for state-sponsored hackers. The average data breach cost reached **$4.8 million in 2024**, a 10% increase, representing the highest recorded total. **Industry-Specific Vulnerabilities**: Energy companies' extensive use of **IoT devices, smart grids, and billing systems** creates expanded API attack surfaces. With **API traffic constituting over 71% of web traffic** and enterprises managing an average of **613 API endpoints**, the sector faces unprecedented exposure requiring specialized protection. ## How Threatspy by Secure Blink Helps [Threatspy](https://www.secureblink.com/threatspy) is a developer-first, AI-powered AppSec Management Platform built to secure modern API and web application environments through an integrated, scalable approach. It enables energy and enterprise security teams to: - Detect & Classify Vulnerabilities at Scale -Continuously assess APIs and web apps across environments with contextual precision - Prioritize Based on Reachability & Business Impact - Uses a custom reachability framework to surface truly exploitable risks, not just theoretical ones - Map Remediation to Developer Workflows - Pushes actionable fixes directly into tools like Jira, GitHub, and GitLab for rapid resolution - Enable Security by Design - Embeds security earlier in the SDLC, guiding developers with best practices and reducing MTTR - Automate Compliance Readiness - Aligns with standards like OWASP ASVS, ISO 27001, and NIST for easier audits In the wake of incidents like TotalEnergies, proactive AppSec isn’t optional — it’s foundational. Threatspy equips CISOs and AppSec teams with the speed, intelligence, and developer alignment needed to stay ahead of modern threats. Experience Threatspy in action—request your free [demo](https://www.secureblink.com/threatspy#request-demo) now and secure your APIs today!

loading..   04-Jun-2025
loading..   4 min read
loading..

Colorama

PyPi

Sophisticated PyPI attack targets Colorama users with cross-platform malware, ev...

A sophisticated supply chain attack targeting the Python Package Index (PyPI) has exposed systemic vulnerabilities in open-source ecosystems, leveraging the popularity of the **colorama** library—a tool with over **215 million monthly downloads**—to deploy cross-platform malware. Discovered by Checkmarx researchers in May 2024, the campaign combined typosquatting, multi-platform payloads, and advanced evasion techniques, highlighting the escalating threats to software supply chains. ## Typosquatting Meets Cross-Ecosystem Deception ### Exploiting Trust in Open-Source Repositories The attackers uploaded malicious PyPI packages with names like **coloramapkgs**, **coloraiz**, and **colorizator**, mimicking both **colorama** (Python) and **colorizr** (NPM) to exploit developer confusion[1][2][9]. This cross-ecosystem baiting tactic—using NPM-inspired names on PyPI—marked a novel escalation in supply chain attacks, potentially targeting JavaScript developers unfamiliar with Python-specific tools[1][2]. ### Multi-Platform Payloads for Maximum Impact Distinct payloads were tailored for **Windows** and **Linux** systems: - **Windows variants** harvested environment variables (e.g., AWS keys) from the registry, disabled Defender via PowerShell, and established persistence through scheduled tasks[1][2][8]. - **Linux payloads** deployed RSA-encrypted reverse shells via **gs-netcat**, masqueraded as kernel processes, and modified **systemd** services for stealth. ## Advanced Evasion & Data Exfiltration ### Windows-Specific Tactics The malware executed commands to bypass defenses: ```powershell Set-MpPreference -DisableRealtimeMonitoring $true ``` It also exfiltrated data via Pastebin’s API and GitHub repositories (e.g., `github.com/s7bhme`), leveraging legitimate services to avoid detection[1][2][8]. ### Linux Payload Sophistication Base64-encoded scripts in `__init__.py` files decrypted into: 1. A public key stored in `/tmp/pub.pem` for encrypted C2 communications. 2. A persistence script injecting malicious code into `.bashrc` and `crontab`. ## Industry Impact: 170,000+ Developers Compromised The attack compromised the GitHub account of a **Top.gg maintainer** (community: 170k+ members), introducing malicious commits to the `python-sdk` repository[8][17]. Stolen data included: - Browser credentials (Chrome, Edge, Brave) - Discord and Telegram session tokens - Cryptocurrency wallet keys. ## Broader Supply Chain Threat Landscape ### A Record Year for Attacks Supply chain incidents surged by **100% YoY**, with **183,000+ customers** affected globally[7][16]. The Colorama attack mirrors trends observed in: - **NPM’s warbeast2000 campaign** (Jan 2024): Stole SSH keys via malicious modules[13]. - **PyPI’s March 2024 suspension**: 500+ typosquatted packages targeting `requests` and `colorama`[9]. ### Open-Source Vulnerabilities Persist Analysis of 30 popular packages revealed **27 flaws per component on average**, with **6 critical vulnerabilities** each[1][6]. Despite PyPI’s popularity (800k+ users), its openness makes it prone to exploitation. ## Mitigation Strategies: SBOMs & Repository Hardening ### Software Composition Analysis (SCA) Tools SCA solutions like **Sonatype** and **Invicti** can: - Detect malicious dependencies in CI/CD pipelines. - Generate Software Bills of Materials (SBOMs) for vulnerability tracking[6][15][18]. ### PyPI Security Enhancements The OpenSSF’s **Principles for Package Repository Security** (v0.1) recommends: - Mandatory MFA for maintainers. - Short-lived API tokens via OpenID Connect. - Machine learning-driven malicious package detection. ## Regulatory Response & Future Outlook CISA’s **SBOM Framework** (Oct 2024) mandates transparency in software components, requiring: - License and copyright holder disclosures. - Risk management integration for critical infrastructure[4][15][20]. **Expert Take:** *“This attack underscores that supply chain security isn’t just about code—it’s about the entire ecosystem’s resilience. Developers must adopt zero-trust principles for dependencies.”* – Ariel Harush, Checkmarx. With **72,065 SBOMs published in 2023** and PyPI downloads exceeding **241 million/month**, the industry must prioritize: - Automated dependency scanning. - Cross-repository threat intelligence sharing. - Regulatory compliance with CISA’s SBOM guidelines. As supply chain attacks evolve, proactive collaboration—not just reactive measures—will define cybersecurity success in 2025 and beyond.

loading..   02-Jun-2025
loading..   3 min read