A popular NPM package used across the organization's Node.js microservices is compromised via a maintainer account takeover. The malicious version exfiltrates environment variables (including database credentials and API keys) to an attacker-controlled endpoint. The compromised package was automatically pulled in during a routine CI/CD build.
| Metric | Expected | Actual | Result |
|---|---|---|---|
| Pattern Recognition | UNKNOWN | UNKNOWN | |
| Severity Assessment | CRITICAL | CRITICAL | |
| Incident Correlation | Yes | 42 linked | |
| Cascade Escalation | Yes | Yes | |
| Remediation | — | Remote Hands — Corax contacts on-site support via call, email, or API |
NPM package '@acme/shared-utils' v3.2.1 compromised (maintainer account hijacked). Package used by 14 microservices. CI/CD pipeline auto-installed latest minor version. Malicious postinstall script runs on npm install. Exfiltrates process.env to external endpoint. 6 production services already deployed with malicious version.