[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fmQpWCYUM-9bWgpObrxmAQhmievjDrk9DjlfsJph_KdM":3},{"article":4,"iocs":61},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":35,"category":36,"article_tags":40},"82ba1008-c993-4751-bc59-0fab8dbd4d3b","GitHub links repo breach to TanStack npm supply-chain attack","github-links-repo-breach-to-tanstack-npm-supply-chain-attack-8023fe","GitHub says the hackers who breached 3,800 internal repositories gained access via a malicious version of the Nx Console VS Code extension, compromised in last week's TanStack npm supply-chain attack. [...]","GitHub disclosed a breach of 3,800 internal repositories stemming from an employee installing a malicious version of the Nx Console VS Code extension, which was compromised as part of the TanStack npm supply-chain attack attributed to TeamPCP. The poisoned extension (v18.95.0) was designed to steal credentials for npm, AWS, Kubernetes, GitHub, and GCP\u002FDocker; it was live for ~18 minutes on VS Code Marketplace and 36 minutes on OpenVSX before removal. TeamPCP has claimed access to ~4,000 private GitHub repos and is demanding at least $50,000 for the data.","GitHub breach of 3,800 repos linked to malicious Nx Console extension in TanStack npm supply-chain attack","GitHub links repo breach to TanStack npm supply-chain attack By Sergiu Gatlan May 21, 2026 02:54 AM 0 GitHub says the hackers who breached 3,800 internal repositories gained access via a malicious version of the Nx Console VS Code extension, compromised in last week's TanStack npm supply-chain attack. This attack is attributed to the TeamPCP threat group and began with the compromise of dozens of TanStack and Mistral AI npm packages, then quickly extended to other projects (including UiPath, Guardrails AI, and OpenSearch) using stolen CI\u002FCD credentials. TeamPCP was linked to other major supply chain attacks targeting developer code platforms, including PyPI, NPM, GitHub, and Docker, and, more recently, to the \"Mini Shai-Hulud\" supply chain campaign (which also affected two OpenAI employees). GitHub revealed the breach on Tuesday, saying it was investigating claims of unauthorized access to its internal repositories and telling BleepingComputer that the incident resulted from an employee installing a malicious Visual Studio Code (VS Code) extension, without disclosing the extension's name. In a blog published Wednesday evening, GitHub CISO Alexis Wales said the breach involved a malicious version of Nx Console, the official Visual Studio Code marketplace extension for Nx, that allows developers to manage large repos and multi-project codebases without relying entirely on complex Terminal CLI commands. Wakes added that GitHub has since secured the compromised device and has yet to find evidence that customer data stored outside the affected repos has been stolen. \"We rotated critical secrets Monday and into Tuesday with the highest-impact credentials prioritized first,\" Wales said. \"We continue to analyze logs, validate secret rotation, and monitor our infrastructure for any follow-on activity. We will take additional action as the investigation warrants.\" While GitHub has yet to attribute the attack to a specific hacking group or threat actor, the TeamPCP cybercrime gang claimed access to GitHub source code and \"~4,000 repos of private code\" on the Breached forum on Tuesday, and is now asking for at least $50,000 for the stolen data. TeamPCP GitHub breach claims (Matthew Maynard) ​This comes after the Nx devs revealed on Monday that they were jointly investigating the impact of the attack with GitHub and Microsoft, after a malicious version of Nx Console 18.95.0 was available on the Visual Studio Marketplace for approximately 18 minutes and on OpenVSX for another 36 minutes. The poisoned extension deployed a malicious payload designed to steal credentials and secrets for a wide range of platforms, including npm, AWS, Kubernetes, GitHub, and GCP\u002FDocker. \"One of our developers was compromised by a recent supply-chain compromise on Tanstack, which leaked their GitHub credentials through the GitHub CLI (gh). This allowed the attacker to run workflows on our GitHub repository as a contributor,\" the NX team said. \"According to Microsoft and OpenVSX, download numbers for the impacted 18.95.0 version were a low 28 and 41 respectively. [..] Two days after the attack, our analytics have registered approximately 6000 extension activations from VSCode and 0 from other editors (including VSCode forks like Cursor).\" In recent years, multiple other malicious VS Code extensions with millions of installs have snuck on the official VS Code marketplace and have been used to steal developer credentials and other sensitive data. Last year, several VS Code extensions with 9 million installs were removed due to security risks, including 10 that infected users with the XMRig cryptominer, while a malicious extension with basic ransomware capabilities was later spotted on the VS Code marketplace after the threat actor WhiteCobra flooded it with 24 crypto-stealing extensions. In January, two more extensions posing as AI-based coding assistants, with 1.5 million installs, were used to exfiltrate data from compromised developer systems to servers in China. GitHub's cloud-based platform is used by more than 4 million organizations (including 90% of Fortune 100 companies) and over 180 million developers who contribute to more than 420 million code repositories. The Validation Gap: Automated Pentesting Answers One Question. You Need Six. Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.This guide covers the 6 surfaces you actually need to validate. Download Now Related Articles: GitHub confirms breach of 3,800 repos via malicious VSCode extensionGitHub investigates internal repositories breach claimed by TeamPCPTeamPCP hackers advertise Mistral AI code repos for saleGrafana breach caused by missed token rotation after TanStack attack7-Eleven confirms data breach claimed by the ShinyHunters gang","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Fgithub-links-repo-breach-to-tanstack-npm-supply-chain-attack\u002F","https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fhl-images\u002F2026\u002F05\u002F21\u002FGitHub_headpic.jpg","2026-05-21T06:54:01+00:00","2026-05-21T08:00:09.798135+00:00",9,[18,21,24,27,29,32],{"name":19,"type":20},"TeamPCP","threat_actor",{"name":22,"type":23},"Nx Console","product",{"name":25,"type":26},"GitHub","vendor",{"name":28,"type":26},"Microsoft",{"name":30,"type":31},"VS Code Marketplace","technology",{"name":33,"type":34},"TanStack npm supply-chain attack","campaign","26b0b636-0e31-4db1-bffb-61bdf9f20a58",{"id":35,"icon":37,"name":38,"slug":39},null,"Supply Chain","supply-chain",[41,46,51,56],{"category":42},{"id":43,"icon":37,"name":44,"slug":45},"2e06f76c-d5b9-4f54-9eef-4d3447b10730","Breaches","breaches",{"category":47},{"id":48,"icon":37,"name":49,"slug":50},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",{"category":52},{"id":53,"icon":37,"name":54,"slug":55},"ade75414-7914-4e23-a450-48b64546ee70","Open Source","open-source",{"category":57},{"id":58,"icon":37,"name":59,"slug":60},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[62],{"type":50,"value":63,"context":64},"Nx Console 18.95.0","Malicious VS Code extension deployed credential-stealing payload"]