{"id":5041,"date":"2025-07-28T19:12:00","date_gmt":"2025-07-28T19:12:00","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/28\/hackers-breach-toptal-github-publish-10-malicious-npm-packages-with-5000-downloads\/"},"modified":"2025-07-28T19:12:00","modified_gmt":"2025-07-28T19:12:00","slug":"hackers-breach-toptal-github-publish-10-malicious-npm-packages-with-5000-downloads","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/28\/hackers-breach-toptal-github-publish-10-malicious-npm-packages-with-5000-downloads\/","title":{"rendered":"Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads"},"content":{"rendered":"<p>\u200bIn what&#8217;s the latest instance of a software supply chain attack, unknown threat actors managed to compromise Toptal&#8217;s GitHub organization account and leveraged that access to publish 10 malicious packages to the npm registry.<br \/>\nThe packages contained code to exfiltrate GitHub authentication tokens and destroy victim systems, Socket said in a report published last week. In addition, 73 repositories\u00a0In what&#8217;s the latest instance of a software supply chain attack, unknown threat actors managed to compromise Toptal&#8217;s GitHub organization account and leveraged that access to publish 10 malicious packages to the npm registry.<br \/>\nThe packages contained code to exfiltrate GitHub authentication tokens and destroy victim systems, Socket said in a report published last week. In addition, 73 repositories\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bIn what&#8217;s the latest instance of a software supply chain attack, unknown threat actors managed to compromise Toptal&#8217;s GitHub organization account and leveraged that access to publish 10 malicious packages to the npm registry. The packages contained code to exfiltrate GitHub authentication tokens and destroy victim systems, Socket said in a report published last week.&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/28\/hackers-breach-toptal-github-publish-10-malicious-npm-packages-with-5000-downloads\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":5042,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5041"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=5041"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/5042"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=5041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=5041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=5041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}