Executive Summary
In February 2026, a sophisticated supply chain attack, dubbed SANDWORM_MODE, targeted the npm ecosystem by distributing at least 19 malicious packages. These packages were designed to harvest sensitive information, including system data, access tokens, environment secrets, and API keys from developer environments. The malware propagated by exploiting compromised npm and GitHub accounts, enabling widespread credential theft and unauthorized access to development infrastructures. Notably, the attack introduced a module that infiltrated AI coding assistants, extracting API keys from nine large language model providers and injecting malicious servers into tool configurations. This incident underscores the escalating complexity and reach of supply chain attacks, particularly those leveraging trusted open-source repositories. The integration of AI toolchain manipulation highlights a concerning evolution in attacker tactics, emphasizing the need for enhanced vigilance and security measures within development environments.
Why This Matters Now
The SANDWORM_MODE attack exemplifies the growing sophistication of supply chain threats, especially targeting open-source ecosystems and AI development tools. As developers increasingly rely on these resources, the potential for widespread compromise escalates, necessitating immediate attention to supply chain security practices and the implementation of robust monitoring and mitigation strategies.
Attack Path Analysis
The SANDWORM_MODE campaign began with the publication of malicious npm packages that, when installed, executed scripts to harvest developer credentials and secrets. Using the stolen credentials, the malware escalated privileges by accessing sensitive repositories and CI/CD environments. It then moved laterally by injecting malicious code into additional repositories and modifying GitHub Actions workflows. The malware established command and control by exfiltrating harvested data via HTTPS with DNS fallback mechanisms. Exfiltrated data included system information, access tokens, and API keys. The impact included potential unauthorized access to sensitive data, compromise of CI/CD pipelines, and the risk of further propagation through the software supply chain.
Kill Chain Progression
Initial Compromise
Description
Malicious npm packages were published and installed by developers, executing scripts that harvested credentials and secrets.
MITRE ATT&CK® Techniques
Compromise Software Dependencies and Development Tools
User Execution: Malicious Library
Unsecured Credentials
Command and Scripting Interpreter
Exfiltration Over C2 Channel
Application Layer Protocol
Hide Artifacts: Hidden Files and Directories
Scheduled Task/Job: Scheduled Task
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Security of Software Development Processes
Control ID: 6.3.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 6
CISA ZTMM 2.0 – Data Security
Control ID: Pillar 3: Data
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Critical supply chain attack targeting npm packages and AI coding assistants threatens CI/CD pipelines, cryptocurrency keys, and development environments with credential harvesting malware.
Information Technology/IT
Malicious npm packages exploit developer toolchains, harvest API tokens and system credentials, while targeting VS Code extensions and cloud infrastructure with propagation capabilities.
Financial Services
Cryptocurrency key theft and API token harvesting from compromised developer environments pose significant risks to digital asset management and financial application security.
Computer/Network Security
Supply chain worm demonstrates advanced evasion techniques including polymorphic engines, MCP injection attacks, and zero trust segmentation bypass capabilities requiring enhanced threat detection.
Sources
- Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokenshttps://thehackernews.com/2026/02/malicious-npm-packages-harvest-crypto.htmlVerified
- SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchainshttps://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoningVerified
- Widespread Supply Chain Compromise Impacting npm Ecosystemhttps://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystemVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to the SANDWORM_MODE campaign as it could likely limit the attacker's ability to escalate privileges, move laterally, and exfiltrate data within cloud environments.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The CNSF may limit the attacker's ability to exploit compromised credentials by enforcing strict identity-based access controls.
Control: Zero Trust Segmentation
Mitigation: Zero Trust Segmentation would likely restrict unauthorized access to sensitive repositories, limiting the attacker's ability to escalate privileges.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security may limit the attacker's ability to move laterally by enforcing strict communication policies between workloads.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control would likely detect and limit unauthorized outbound communications to external servers.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement may limit the attacker's ability to exfiltrate sensitive data by enforcing strict outbound traffic policies.
The implementation of Aviatrix Zero Trust CNSF would likely reduce the overall impact by limiting unauthorized access and propagation within the cloud environment.
Impact at a Glance
Affected Business Functions
- Software Development
- Continuous Integration/Continuous Deployment (CI/CD) Pipelines
- Credential Management
- Cryptocurrency Transactions
Estimated downtime: 7 days
Estimated loss: $500,000
Compromised API keys, access tokens, and cryptocurrency keys from developer environments.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement within development environments.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing unauthorized data exfiltration.
- • Utilize Multicloud Visibility & Control to gain comprehensive insights into cross-cloud activities and detect anomalous behaviors.
- • Apply Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious activities in real-time.
- • Regularly audit and update CI/CD pipelines and dependencies to mitigate risks associated with supply chain attacks.



