GitHub Typosquatting: When Hackers Spell Trouble with npm! 🚨
Veracode discovered a cunning attempt to steal GitHub credentials using a malicious npm package. The hackers used typosquatting with a fake “GitHub Actions Toolkit” to trick developers. This sneaky scheme had over 206,000 downloads before being shut down. Lucky for some, Veracode’s Package Firewall was already on guard.

Hot Take:
In a plot twist straight out of a cyber-thriller, hackers have been caught doing the digital equivalent of “hiding in plain sight” by targeting GitHub’s code base with a fake npm package. It’s like finding out your grandmother’s secret cookie recipe has been tampered with by the Cookie Monster himself! Who knew that typosquatting could be more dangerous than autocorrect? Time to double-check those package names, folks, because it’s not just your spellcheck that’s at stake!
Key Points:
– Hackers targeted GitHub’s code base using a fake npm package.
– The package was named “@acitons/artifact” to trick developers via typosquatting.
– Over 206,000 downloads of the malicious package were recorded.
– The attack aimed to steal GitHub tokens using a post-install hook.
– Veracode’s Package Firewall protected its customers immediately after the threat was discovered.
