AWS Admin Access Gained in nx npm Supply Chain Breach

You probably thought you could relax about software updates. Developers crank out endless new versions of your favorite tools, and all you do is run npm install, eyes glazed over, trusting the thousands of invisible hands on the internet. Maybe your boss even told you to "keep dependencies up-to-date or else." But UNC6426—whoever they actually are—just reminded everyone why supply chain attacks are the gift that keeps on giving, and why pretending this problem will solve itself is an absolute fantasy.

How One npm Update Nuked an Entire AWS Environment

In August 2025, the nx npm package (yes, the popular one for JavaScript/TypeScript monorepos) pulled a fast one on its maintainers and, by extension, thousands of companies. Attackers with the boringly cryptic handle "UNC6426" found a soft spot: a messy pull_request_target GitHub workflow. Apparently, the workflow let outside contributors run code with more privileges than a Vegas pit boss. This wasn't a new trick ("Pwn Request," for those keeping score), but the results were anything but passé.

UNC6426 injected a poisoned update into the nx package, uploaded it to npm, and waited. All it took was one developer running an auto-update—via the innocent-seeming Nx Console plugin in their code editor—for the attack to begin in earnest. The script installed QUIETVAULT, a credential-stealing bit of JavaScript that, in a particularly dystopian twist, pressed an LLM tool already on the victim’s workstation into service. Why bother reverse-engineering binaries when you can let an AI comb through credentials for you? Just another reminder that AI isn’t just your co-pilot—it’s also on the enemy’s team.

The Domino Effect: From PATs to Full AWS Reign

Everything snowballed from there. The QUIETVAULT malware promptly harvested environment variables, application tokens, and a coveted GitHub Personal Access Token (PAT). If you’re keeping score, this is where most organizations assume their cloud secrets are safe, locked behind a veneer of MFA and IAM roles. But secrets leak like a rusty faucet. With the PAT, UNC6426 started poking around GitHub with a grace reminiscent of an opportunistic raccoon.

Using the open-source Nord Stream tool (nice touch), they dug secrets from the victim's CI/CD pipeline. Unsurprisingly, none of those accounts were restricted tight enough. Once they exfiltrated a CI/CD service account credential, they minted AWS Security Token Service (STS) tokens. What did they use those for? Why, to get the “Actions-CloudFormation” role in AWS—because of course it was over-permissive.

Privilege Escalation: Easy Mode for Attackers

If you’re naive enough to think AWS accounts always follow security best practices, here’s your wake-up call. The "Actions-CloudFormation" role did pretty much everything but make coffee. UNC6426 spun up their own CloudFormation stack, then created and attached AdministratorAccess to a new IAM role they controlled. Less than 72 hours from initial breach to cloud-wide admin override. That's not a sophisticated heist—that's a smash-and-grab enabled by years of security apathy and "just ship it" culture.

Carnage: Data, Service, and Reputation Up in Flames

With admin powers, UNC6426 went to work. They:

  • Enumerated and exfiltrated files from S3 buckets. If you had sensitive data, it was probably gone.
  • Terminated production EC2 and RDS instances, taking down critical business infrastructure. Hope your disaster recovery isn’t just a checklist and a prayer.
  • Decrypted application credentials, potentially exposing other systems, partners, or customers. Collateral damage, anyone?
  • Renamed every internal GitHub repo to a /s1ngularity-repository-[random] format and made them public. Proprietary source code? It’s open source now, congrats!

This isn't clever cyber-espionage; it's a public mugging. The technical ineptitude of default configs and endless trust in upstream code did more for UNC6426 than any zero-day ever could.

Why You Keep Getting Burned

If this incident feels depressingly familiar, it’s because absolutely nothing about modern cloud and software workflows is truly safe from these supply chain screw-ups. Here’s the ugly truth:

  • Package managers routinely execute random code on your machines. You want the new hotness? Ready for the malware, too.
  • GitHub PATs are treated like candy, often with way too many permissions and expiry periods that stretch into the next era.
  • CI/CD accounts generally have more privileges than anyone wants to audit, because nobody actually likes RBAC paperwork.
  • AWS IAM policies? Written in a haze of Stack Overflow snippets and wishful thinking. Least privilege is for someone else’s cloud tenant.
  • AI is now actively accelerating attacks. QUIETVAULT’s ploy of using the victim’s LLM to sniff out secrets is just the start.

Who needs C2 callbacks when your supply chain basically is the attacker’s callback?

This Will Happen Again—Unless You Finally Wise Up

Some folks will hand out the usual advice. Package managers should block postinstall scripts; CI/CD accounts should be least-privilege; PATs should expire faster and be more narrowly scoped; you should actually monitor IAM activity regularly. For those who like acronyms, sprinkle in some EDR, SCA, and MFA just to pretend it’s handled. But we both know real change won’t happen until things repeatedly break, public outrage mounts, and compliance audits make your lives hell.

Maybe it’ll take the next breach being at a trillion-dollar company before anybody finally disables postinstall scripts by default or writes IAM policies that don’t make your SOC team cry. Until then, good luck and happy updating. The supply chain isn’t just weak—it’s wide open, and the bad guys know it better than you ever will.

Suggested readings ...