惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Google DeepMind News
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
爱范儿
爱范儿
WordPress大学
WordPress大学
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
美团技术团队
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
MyScale Blog
D
Docker
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
AWS News Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
NISL@THU
The Register - Security
The Register - Security
Recent Commits to openclaw:main
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA

The Hacker News

Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories Microsoft Warns of Two Actively Exploited Defender Vulnerabilities When Identity is the Attack Path 9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API Agent AI is Coming. Are You Ready? Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit Grafana GitHub Breach Exposes Source Code via TanStack npm Attack GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability The New Phishing Click: How OAuth Consent Bypasses MFA Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More How to Reduce Phishing Exposure Before It Turns into Business Disruption Developer Workstations Are Now Part of the Software Supply Chain Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure How AI Hallucinations Are Creating Real Security Risks Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation [Webinar] Why Your AppSec Tools Miss the "Lethal Path" (and How to Fix It) Most Remediation Programs Never Confirm the Fix Actually Worked Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data Android Adds Intrusion Logging for Sophisticated Spyware Forensics New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help Why Agentic AI Is Security's Next Blind Spot Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories Day Zero Readiness: The Operational Gaps That Break Incident Response PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing? Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed
Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem
info@thehack · 2026-05-20 · via The Hacker News

AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here's why your current stack can't see them, and what detection actually requires.

Download the CISO Expert Guide to Typosquatting in the AI Era →

TL;DR 

  • Typosquatting is no longer a user problem. Attackers now embed lookalike domains inside legitimate third-party scripts. No mistyped URL required, no server breach needed.
  • AI broke the economics of defense. LLMs generate thousands of convincing domain variants in minutes; full campaign deployment takes under ten. Malicious package uploads jumped 156% last year. Manual vetting is dead.
  • Your security stack can't see this. Firewalls, WAFs, EDR, and CSP have no visibility into what approved scripts do once they execute in the browser.
  • The Trust Wallet attack proved it. $8.5M stolen in 48 hours through a trojanized Chrome extension. No alert fired, not because something failed, but because nothing was watching.

This isn't a crypto story

On December 24, 2025, Trust Wallet users started losing money. Not because they clicked a phishing link. Not because they reused a weak password. Not because they did anything wrong at all.

A self-replicating npm worm called Shai-Hulud had spent months harvesting developer credentials: GitHub tokens, npm publishing keys, and Chrome Web Store API credentials. Those keys allowed attackers to push a trojanized version of the Trust Wallet Chrome extension through official channels. Chrome's verification passed it.

The malicious extension executed entirely inside users' browsers, silently capturing seed phrases and transmitting them to the attacker's infrastructure at a domain disguised as Trust Wallet's own analytics endpoint. Within 48 hours, 2,500 wallets had been drained. Total loss: $8.5 million. No server was breached. No alert ever fired.

Strip away the seed phrases and what remains is this: a trusted browser-delivered asset was silently modified to intercept sensitive user data before the legitimate application could process it, invisible to server logs, firewalls, WAFs, and EDR. Not because those controls were misconfigured, but because they were never designed to observe what happens inside a browser session, even a poisoned one. 

Swap seed phrases for payment card data. Swap the Chrome extension for a marketing pixel, a support widget, or an A/B testing framework. The attack is identical. A typical e-commerce checkout page runs 40-60 third-party scripts. Each is a trusted connection. The same thing could happen there.

How typosquatting got here: three phases

What makes Phase 3 a genuine evolution isn't just sophistication, it's economics. LLMs can generate thousands of convincing domain variations in minutes. Homograph attacks combine Latin, Cyrillic, and Greek characters to produce domains that appear visually identical in browser address bars while evading string-distance detection. Domain registration, SSL issuance, and full campaign deployment now take under ten minutes. Sonatype's data shows malicious package uploads to open-source repositories jumped 156% year-over-year, so volume alone has made manual vetting structurally impossible.

Three attacks that show the pattern

Typosquatting targets the domain layer, package compromise targets the supply chain, and browser-runtime abuse targets what trusted code does after it executes. 

1. Trust Wallet Chrome Extension (December 2025) 

Shai-Hulud harvested developer credentials over months before pushing a trojanized extension through official Chrome Web Store channels. The malicious extension captured seed phrases and transmitted them to a lookalike analytics domain. 2,500 wallets drained. $8.5M lost. Detection time: zero. No server-side visibility exists for browser-runtime execution.

2. chalk/debug npm attack (September 2025)

A phishing email targeting a single package maintainer gave attackers access to 18 trusted JavaScript libraries, including chalk and debug, with over two billion combined weekly downloads. Within 16 minutes, malicious code was injected across all of them, hooking browser APIs to silently intercept network traffic and wallet interactions. Fast containment limited direct losses to around $500. The exposure window wasn't the story. Two billion downloads was.

3. Solana Web3.js Library Attack (December 2024) 

Attackers compromised a publish-access account for the @solana/web3.js npm library through a phishing campaign, then published malicious versions containing a hidden function that intercepted private keys mid-transaction and exfiltrated them to an attacker-controlled domain registered just days before the attack. Any application that auto-updated within the five-hour window shipped the backdoor directly to its users. Nearly $200,000 drained before discovery. 

How the compromise happens: trust replaces deception

Classic social engineering needed a human in the loop, someone to mistype a URL, click a link, approve a prompt, trust a sender. The attacker's job was to manufacture trust in the moment.

The current generation of attacks skips that step entirely. Trust is no longer manufactured, it's inherited. Your build pipeline already trusts npm. Your vendor already trusts their CDN. Your browser already trusts the vendor. The attacker doesn't need to deceive anyone; they only need to insert themselves anywhere along a chain of trust that's already been granted.

Call it supply chain subversion - the deception isn't aimed at a person; it's aimed at the dependency graph.

The blind spot in your security stack

A marketing vendor integrated into your web properties references a JavaScript CDN registered six weeks ago. Valid SSL. Recognizable domain. Then the script is quietly updated. 

On your payment page, the browser silently loads the modified script. An invisible overlay intercepts keystrokes before they reach your application. Your server logs record a normal session. No alert fires.

CSP is the control most often cited as the defense. But CSP is a guest list, not a behavior monitor. An allowlisted script that reads your payment form fields and exfiltrates the data is still fully permitted, because the origin is trusted. CSP handles the connection. It cannot handle the execution.

Malicious behavior in 2026 is deferred to runtime by design. Shai-Hulud's packages remained dormant during automated scanning, only activating under specific runtime conditions. Static analysis cannot catch payloads loaded dynamically after execution begins.

What detection actually requires

IBM's 2025 Cost of a Data Breach Report found that the average breach takes 241 days to identify. In supply chain attacks where malicious behavior executes silently in browser memory, that window can be significantly longer, unless you're watching the runtime.

Detection requires observing what scripts actually do after they execute: which domains they communicate with, which page elements they access, and how their behavior deviates from established baselines. That's runtime behavioral monitoring, the one layer most enterprise security stacks currently lack.

The characteristics to monitor for:

  • Unexpected data exfiltration: Scripts reading form fields and transmitting values to domains outside your approved list
  • Dynamic domain resolution: Scripts calling domains registered recently or resolving differently than their baseline
  • Behavioral drift: A script that behaved normally last week is now accessing different page elements this week. 

Detecting a suspicious domain in your dependency tree is necessary, but not sufficient. The harder problem is understanding what the script loaded from that domain actually does. AI-generated obfuscation is now specifically engineered to defeat static analysis: the code passes linting, mimics legitimate minified libraries, and produces no signature matches. 

Closing that gap requires behavioral deobfuscation at runtime, executing the script in an instrumented environment and tracing its actual behavior, not attempting to read its source. That means surfacing what a script actually accesses: form fields, cookies, network endpoints -  regardless of how heavily obfuscated the source is. It's the approach Reflectiz built its AI deobfuscator around, and it's detailed in the guide below. 

Your action plan

If you're not sure where to start, prioritize by exposure: payment pages first, authentication pages second, everything else after. Here's a practical sequence: 

This week:

  • Audit third-party scripts for recently registered CDN domains in your dependency chain
  • Review CSP reports, not just violations, but what your approved origins are actually doing
  • Identify which pages handle sensitive data (payment, login, PII forms) and prioritize monitoring there first

This month:

  • Deploy runtime behavioral monitoring for payment and authentication pages
  • Establish behavioral baselines for all approved third-party scripts
  • Implement subresource integrity (SRI) checks where scripts are self-hosted or cacheable

Proactive domain registration, strict CSP, and enforced DMARC are necessary. They cover domain registration, script delivery, and email impersonation. None of them covers what happens after an approved vendor script is silently modified. That's the gap most teams don't see until it's too late.

The controls above tell you what to do. Mapping them to your actual environment, vendor inventory, and compliance obligations is where execution stalls. Reflectiz has published a CISO Expert Guide with the complete framework: domain governance, foundational controls, runtime behavioral monitoring, and a phased implementation roadmap built around that gap.

Download the guide here →

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.