OpenAI hit by supply chain attack linked to malicious TanStack packages

Security Affairs
Actively Exploited

Overview

OpenAI confirmed that a supply chain attack linked to malicious TanStack packages compromised two of its employee devices. This breach exposed sensitive credentials from the company's internal source code repositories. The attackers, part of a group known as TeamPCP, exploited vulnerabilities in the package publishing process to gain access. This incident raises concerns about the security of software supply chains, as it demonstrates how vulnerabilities can lead to significant data exposure. Organizations must be vigilant in monitoring their package management systems to prevent similar attacks.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: OpenAI employee devices, internal source code repositories
  • Action Required: Organizations should review and secure their package publishing processes, implement stricter access controls, and monitor for unauthorized changes or access.
  • Timeline: Disclosed on October 2023

Original Article Summary

OpenAI said the TanStack supply chain attack compromised two employee devices and exposed credentials from code repositories. OpenAI confirmed that the recent TanStack supply chain attack compromised two employee devices and exposed credential material stored in internal source code repositories. The incident began after the TeamPCP hacking group abused weaknesses in the package publishing process […]

Impact

OpenAI employee devices, internal source code repositories

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Disclosed on October 2023

Remediation

Organizations should review and secure their package publishing processes, implement stricter access controls, and monitor for unauthorized changes or access.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

Pwn2Own Berlin 2026, Day Three: DEVCORE Crowned Master of Pwn, $1.298 Million Total

Security Affairs

Pwn2Own Berlin 2026 concluded with DEVCORE emerging as the standout performer, successfully identifying 47 unique zero-day vulnerabilities during the event. Over three days, researchers earned a total of $1.29 million in rewards for their discoveries, showcasing the event's focus on security challenges across various platforms and applications. This year's competition not only highlighted the skills of participants but also underscored the ongoing need for robust cybersecurity measures in software development. With the number of zero-day vulnerabilities found, it emphasizes the vulnerabilities present in widely used systems and applications, prompting companies to reassess their security protocols. The event took place in conjunction with OffensiveCon, further connecting the research community with industry professionals.

May 17, 2026

Russian hackers turn Kazuar backdoor into modular P2P botnet

BleepingComputer

The Russian hacker group known as Secret Blizzard has transformed its Kazuar backdoor into a more sophisticated modular peer-to-peer (P2P) botnet. This new version is designed for long-term stealth and effective data collection, making it a significant threat to targeted organizations. The botnet's P2P structure allows it to operate without relying on a central command server, which complicates detection and mitigation efforts. This development raises concerns for businesses and individuals alike, as it could lead to unauthorized data access and prolonged security breaches. Cybersecurity experts are urging organizations to enhance their defenses against these evolving threats, as the Kazuar botnet is likely to be used for various malicious activities, including espionage and data theft.

May 16, 2026

TeamPCP releases ‘vibe coded’ Shai-Hulud source code, issues challenge

SCM feed for Latest

TeamPCP has released the source code for a variant of the Shai-Hulud malware, which has been implicated in recent attacks against companies like TanStack. While researchers indicate that this particular version is not the original malware, its release poses a risk as it may enable other attackers to replicate or modify the malware for their own use. The significance of this release lies in the potential for increased attacks against vulnerable systems, as the source code can be used by less skilled cybercriminals. Organizations need to remain vigilant and strengthen their defenses in light of this development to protect against possible exploits stemming from the released code.

May 15, 2026

Hackers use PyInstaller to hide XWorm malware

SCM feed for Latest

Hackers are using PyInstaller to disguise XWorm malware, which is being delivered through deceptive emails or fake software updates that contain seemingly harmless files. Once a victim opens the infected file, the malware can execute and potentially compromise the user’s system. This tactic not only makes it difficult for antivirus programs to detect the malware but also highlights the ongoing risks associated with social engineering attacks. Users and organizations need to be cautious about unsolicited emails and software updates, ensuring they verify the source before downloading or opening any files. This incident serves as a reminder of the importance of cybersecurity awareness and vigilance in protecting personal and sensitive information.

May 15, 2026

FTC begins enforcing Take It Down Act for nonconsensual deepfakes

SCM feed for Latest

The Federal Trade Commission (FTC) is now enforcing the Take It Down Act, a law aimed at combating nonconsensual intimate imagery and AI-generated deepfakes. Under this law, online platforms are required to remove such content within 48 hours after a victim reports it. This is significant as it provides victims with a quicker pathway to protect their privacy and dignity against harmful digital forgeries. The act reflects growing concerns about the misuse of technology to create and share intimate images without consent, which can have devastating effects on individuals. By imposing strict removal timelines, the FTC is taking steps to hold platforms accountable and enhance user safety online.

May 15, 2026

U.S. officials discard items from China trip over security concerns

SCM feed for Latest

During a recent meeting between U.S. officials and Chinese leaders, security concerns prompted American personnel to leave behind certain items, including burner phones and lapel pins that were presented as gifts. This decision reflects ongoing worries about surveillance and data security, particularly in high-stakes diplomatic interactions. By discarding these items, U.S. officials are taking precautionary measures to prevent potential breaches of sensitive information. The move highlights the increasing focus on cybersecurity in international relations and the lengths officials will go to protect their communications. This incident serves as a reminder of the vulnerabilities that can arise when dealing with foreign governments, especially in contexts where trust is limited.

May 15, 2026