Article Details
Scrape Timestamp (UTC): 2025-07-24 13:34:43.841
Original Article Text
Click to Toggle View
Hackers breach Toptal GitHub account, publish malicious npm packages. Hackers compromised Toptal's GitHub organization account and used their access to publish ten malicious packages on the Node Package Manager (NPM) index. The packages included data-stealing code that collected GitHub authentication tokens and then wiped the victims' systems. Toptal is a freelance talent marketplace that connects companies with software developers, designers, and finance experts. The company also maintains internal developer tools and design systems, most notably Picasso, which they make available through GitHub and NPM. Attackers hijacked Toptal's GitHub organization on July 20, and almost immediately made public all 73 of the repositories available, exposing private projects and source code. In the days that followed, the attackers modified the source code of Picasso on GitHub to include malware and published 10 malicious packages on NPM as Toptal, making them appear as legitimate updates. The malicious packages and modified versions are: The malicious packages were downloaded roughly 5,000 times before being detected, likely infecting developers with malware. The hackers injected the malicious code into 'package.json' files to add two functions: steal data ('preinstall' script) and wipe hosts ('postinstall' script). The first extracts the victim's CLI authentication token and sends it to an attacker-controlled webhook URL, granting them unauthorized access to the target's GitHub account. After exfiltrating the data, the second script attempts to delete the entire filesystem with 'sudo rm -rf --no-preserve-root /' on Linux systems, or recursively and silently delete files on Windows. According to code security platform Socket, Toptal deprecated the malicious packages on July 23 and reverted to safe versions, but issued no public statement to alert users who had downloaded the malicious releases to the risks. Although the initial compromise method remains unknown, Socket lists multiple possibilities ranging from insider threats to phishing attacks targeting Toptal developers. BleepingComputer has contacted Toptal for a statement, but we are still waiting for their response. If you have installed any of the malicious packages, you are advised to revert to a previous stable version as soon as possible. The Board Report Deck CISOs Actually Use CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value. This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.
Daily Brief Summary
Hackers compromised Toptal's GitHub account, publishing ten malicious npm packages.
The malicious code in the npm packages targeted GitHub authentication tokens and then wiped victims' systems.
Toptal, a marketplace for freelance talent such as software developers, uses GitHub and npm for distributing internal tools and systems.
The attack occurred on July 20, with immediate publication of 73 Toptal repositories, exposing private code and projects.
Reported downloads of these malicious packages reached approximately 5,000 before detection.
The attack strategy included inserting data-stealing and system-wiping scripts into npm 'package.json' files.
Toptal retracted the harmful packages by July 23, reverting to previous safe versions, though initially did not issue a public warning.
The breach's exact entry point remains uncertain, with theories suggesting insider threats or phishing scams targeting Toptal developers.