“I Got Pwned”: npm maintainer of Chalk & Debug speaks on the massive supply-chain attack

Posted by Advocatemack@reddit | programming | View on Reddit | 33 comments

Hey Everyone,
This week I posted our discovery of finding that a popular open-source projects, including debug and chalk had been breached. I'm happy to say the Josh (Qix) the maintainer that was compromised agreed to sit down with me and discuss his experience, it was a very candid conversation but one I think was important to have.

Below are some of the highlight and takeaways from the conversation, since the “how could this happen?” question is still circulating.

Phishing + MFA is not a silver bullet

The attackers used a fake NPM login flow and captured his TOTP, allowing them to fully impersonate him. Josh called out not enabling phishing-resistant MFA (FIDO2/U2F) as his biggest technical mistake.

The scale of the blast radius

Charlie (our researcher) spotted the issue while triaging suspicious packages:

Wiz later reported that 99% of cloud environments used at least one affected package. Josh reflected:

There were some 'hot takes' that this wasn't actually a big deal because the impact was so limited (only $900 of crypto was actually stolen). However, 10% of all cloud environments analysed had the malware within them. Had the attackers been smarter (or more malicious), the impact of this could have been huge. This wasn't a win for security; it was a lucky break.

Ecosystem-level shortcomings

Josh was frank about registry response times and missing safeguards:

Josh's advice to anyone this happens to in the future is to be open, transparent and honest. I think the general concensis is that Josh's communication on the breach was very much appreciated especially because it would have been tough.