BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

February 23, 2026Vulnerabilities & Exploits2 min readhigh

Originally reported by The Hacker News, SANS ISC

#supply-chain#npm#malware#muddywater#iran#apt#cryptocurrency#credential-theft
Share

TL;DR

Active npm supply chain worm harvests crypto keys and CI secrets while Iranian APT MuddyWater deploys new malware targeting MENA organizations in coordinated campaign.

Why high?

Active supply chain worm campaign harvesting cryptocurrency keys and CI secrets represents significant threat to development environments. Combined with state-sponsored APT activity deploying new malware families creates elevated risk profile.

Active NPM Supply Chain Worm Harvests Crypto Keys and CI Secrets

Socket's security researchers have identified an ongoing supply chain attack campaign dubbed SANDWORM_MODE, leveraging at least 19 malicious npm packages in what they characterize as a "Shai-Hulud-like" worm operation. The campaign specifically targets cryptocurrency wallet keys, CI/CD pipeline secrets, and API tokens.

The attack follows established patterns from previous Shai-Hulud campaigns, embedding malicious code within legitimate-appearing npm packages to achieve widespread distribution across development environments. The targeting of cryptocurrency keys alongside CI/CD credentials suggests attackers are pursuing both immediate financial gain and persistent infrastructure access.

Socket's discovery highlights the continuing vulnerability of the npm ecosystem to sophisticated supply chain attacks, particularly those designed to propagate through dependency chains.

Iranian APT MuddyWater Deploys New Malware Arsenal in MENA Campaign

The Iranian threat actor MuddyWater (also tracked as Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has initiated a new campaign designated Operation Olalampo, targeting organizations and individuals primarily across the Middle East and North Africa region.

First observed on January 26, 2026, the operation has introduced several new malware families including GhostFetch, CHAR, and HTTP_VIP. These tools represent an evolution in MuddyWater's tactical approach, suggesting continued development of their offensive capabilities.

The campaign's focus on MENA targets aligns with Iran's established geopolitical interests in the region, while the deployment of novel malware families indicates sustained investment in advanced persistent threat capabilities.

SANS ISC Monday Stormcast Available

The SANS Internet Storm Center has released their Monday, February 23rd Stormcast podcast, providing additional threat intelligence analysis and security community updates.

Sources

  • Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens - The Hacker News
  • MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP - The Hacker News
  • ISC Stormcast For Monday, February 23rd, 2026 - SANS ISC

Originally reported by The Hacker News, SANS ISC

Tags

#supply-chain#npm#malware#muddywater#iran#apt#cryptocurrency#credential-theft

Threat Actors

🇮🇷MuddyWater
🇷🇺Sandworm

Related Intelligence

  • Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

    highMar 4, 2026
  • Iranian APT Groups Intensify Cyber Operations Against U.S. and Middle East Infrastructure

    highMar 7, 2026
  • Nation-State Roundup: Iran-Nexus APT Targets Iraq Officials, Phobos Admin Pleads Guilty, Multi-Year Campaign Exposed

    highMar 6, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← ClickFix Campaign Expands to Target Cryptocurrency Wallets and 25+ Browsers

Next Article

Steganography Strikes: Malware Hidden in Images Targets Enterprise Systems →