1,700 Malicious Packages, Snowflake Breach, and the SHA-Pinning Lie

Contagious Interview Expands to Five Ecosystems: 1,700 Packages Since January 2025

  • Socket researcher Kirill Boychenko documents Contagious Interview spreading into Go, Rust, and PHP, with 1,700+ malicious packages identified across npm, PyPI, Go, Rust, and Packagist since January 2025; named packages include logtrace (Rust), logutilkit / fluxhttp (PyPI), and golangorg/logkit (Packagist).
  • The latest packages embed malicious code inside legitimate-looking utility functions (e.g., Logger::trace(i32)) rather than install-time hooks — making static analysis and install-time scanning insufficient for detection.
  • Windows payloads delivered via license-utils-kit include a full post-compromise implant: keylogger, browser credential stealer, AnyDesk deployment, file uploader, and encrypted archive exfil — going well beyond the credential-harvesting RAT seen in earlier Contagious Interview packages.
  • Security Alliance (SEAL) reports blocking 164 UNC1069-linked domains impersonating Microsoft Teams and Zoom between February 6 and April 7; the actor runs multi-week low-pressure social engineering over Telegram, LinkedIn, and Slack before delivering a malicious meeting link. (Previously: UNC1069/Sapphire Sleet attributed to the Axios maintainer hijack — the same cluster is now confirmed behind the cross-ecosystem package campaign.)
  • A new Tracebit post-mortem on TeamPCP reveals the LiteLLM compromise alone exfiltrated approximately 300 GB from 500,000 machines via the .pth persistence mechanism, per vxunderground telemetry. (Previously reported: the poisoned wheel survived pip uninstall — scope is now quantified.)

New Supply Chain Incidents: Anodot/Snowflake and AppsFlyer SDK

  • ShinyHunters breached Anodot (AI analytics SaaS), stealing Snowflake authentication tokens held as a third-party integration; more than a dozen Snowflake customer accounts were compromised, with data theft and extortion following. Snowflake confirmed "unusual activity" and locked impacted accounts; its own infrastructure was not breached. Salesforce access was attempted but blocked.
  • Reflectiz flagged a supply chain attack on the AppsFlyer Web SDK, present in 100,000+ web and mobile applications across crypto, fintech, and e-commerce; WAFs, firewalls, and endpoint agents did not detect the malicious code, highlighting the client-side and third-party script monitoring gap.

Active Exploitation: Ninja Forms RCE, Ivanti EPMM on CISA KEV

  • CVE-2026-0740 (CVSS 9.8) in the Ninja Forms File Uploads WordPress addon is under active exploitation: unauthenticated arbitrary file upload via missing file type validation and insufficient filename sanitization allows PHP webshell placement via path traversal; Wordfence blocked 3,600+ attempts within 24 hours. ~50,000 sites use the addon. Upgrade to Ninja Forms File Uploads v3.3.27 immediately; all prior versions are vulnerable.
  • CISA added CVE-2026-1340 (CVSS 9.8) in Ivanti EPMM to its KEV catalog, a code injection flaw enabling unauthenticated RCE; federal patch deadline is April 11.
  • Chrome 147 patches CVE-2026-5858 and CVE-2026-5859, both rated Critical with $43,000 bug bounties; the flaws are in WebML and V8. No confirmed in-the-wild exploitation yet, separate from the April 3 zero-day (previously reported).
  • GitLab patched 12 vulnerabilities across versions 18.10.3, 18.9.5, and 18.8.9 including critical DoS and code injection flaws; update immediately.

GitHub Actions: SHA-Pinning Is Not What You Think; 2026 Roadmap and Canary Credentials


AI Code Oversight Gap: 93% Usage, 31% Minimal Validation

  • Cloudsmith's 2026 Artifact Management Report (via BetaNews) finds 93% of organizations use AI-generated code, but 31% spend ≤10 hours/month validating it and 5% conduct no audit at all; only 17% are "very confident" AI isn't introducing new vulnerabilities, and 44% experienced a security incident from a third-party dependency in the past year.
  • 53% of respondents cannot produce a comprehensive artifact or SBOM report without heavy manual effort — a direct gap against the EU Cyber Resilience Act's 48-hour breach notification requirement.
  • Gianluca Brindisi at Synthesia details a production AI-powered triage system that auto-triages SAST/SCA findings, opens GitHub issues, and uses coding agents to validate findings and generate fix PRs — reducing manual security review to 11% of prior workload. Practical reference architecture for teams dealing with AI-generated code volume.

Get AppSec Briefing in your inbox

Subscribe to receive new issues as they're published.