GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security

GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack. This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required two-factor authentication (2FA),
[[{“value”:”

GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack.

This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required two-factor authentication (2FA), granular tokens that will have a limited lifetime of seven days, and trusted publishing, which enables the ability to securely publish npm packages directly from CI/CD workflows using OpenID Connect (OIDC).

Trusted publishing, besides eliminating the need for npm tokens, establishes cryptographic trust by authenticating each publish using short-lived, workflow-specific credentials that cannot be exfiltrated or reused. Even more significantly, the npm CLI automatically generates and publishes provenance attestations for the package.

“Every package published via trusted publishing includes cryptographic proof of its source and build environment,” GitHub noted back in late July 2025. “Your users can verify where and how your package was built, increasing trust in your supply chain.”

DFIR Retainer Services

To support these changes, the Microsoft-owned company said it will be enacting the following steps –

  • Deprecate legacy classic tokens.
  • Deprecate time-based one-time password (TOTP) 2FA, migrating users to FIDO-based 2FA.
  • Limit granular tokens with publishing permissions to a shorter expiration.
  • Set publishing access to disallow tokens by default, encouraging usage of trusted publishers or 2FA-enforced local publishing.
  • Remove the option to bypass 2FA for local package publishing.
  • Expand eligible providers for trusted publishing.

The development comes a week after a supply chain attack codenamed Shai-Hulud injected a self-replicating worm into hundreds of npm packages that scanned developer machines for sensitive secrets and transmitted them to an attacker-controlled server.

“By combining self-replication with the capability to steal multiple types of secrets (and not just npm tokens), this worm could have enabled an endless stream of attacks had it not been for timely action from GitHub and open source maintainers,” GitHub’s Xavier René-Corail said.

Npm Package Includes QR Code-Based

The disclosure comes as software supply chain security company Socket said it identified a malicious npm package named fezbox that’s capable of harvesting browser passwords using a novel steganographic technique. The package is no longer available for download from npm. It attracted a total of 476 downloads since it was first published on August 21, 2025.

“In this package, the threat actor (npm alias janedu; registration email janedu0216@gmail[.]com) executes a payload within a QR code to steal username and password credentials from web cookies, within the browser,” security researcher Olivia Brown said.

CIS Build Kits

Fezbox claims to be a JavaScript utility consisting of common helper functions. But, in reality, it harbors stealthy code to fetch a QR code from a remote URL, parse the QR code, and execute the JavaScript payload contained within that URL.

The payload, for its part, attempts to read document.cookie, extracts username and password information from the cookie, and transmits the information to an external server (“my-nest-app-production>.up.railway[.]app”) via an HTTPS POST request.

“Most applications no longer store literal passwords in cookies, so it’s difficult to say how successful this malware would be at its goal,” Brown noted. “However, the use of a QR code for further obfuscation is a creative twist by the threat actor. This technique demonstrates how threat actors continue to improve their obfuscation techniques and why having a dedicated tool to check your dependencies is more important than ever.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

“}]] The Hacker News 

Total
0
Shares
Previous Post

BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Next Post

Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation

Related Posts

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via
Read More

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G. Brown, asked the court to voluntarily
Read More