2025-11-27

Supply chain + dev tooling is also a real macOS vector now

Level: 
Strategic
  |  Source: 
Cryptocurrency
Finance & Technology
Government
Telecommunications
Technology
Share:

Supply chain + dev tooling is also a real macOS vector now

Attackers have identified the fastest and most reliable path onto macOS systems: exploit the tools developers already trust. Rather than attempting to breach perimeter defenses or exploit zero-day vulnerabilities, threat actors are poisoning the developer supply chain—the package managers, build tools, and CI/CD pipelines that developers use daily and inherently trust. This attack vector is devastatingly effective because:

  • Developers have elevated privileges - Often have access to production systems, cloud infrastructure, and sensitive repositories
  • Package managers auto-execute code - npm postinstall scripts, pip setup.py, gem post_install hooks run automatically
  • Trust is assumed - Developers expect packages from npm/PyPI/RubyGems to be safe
  • Detection gaps exist - Security tools focus on perimeter defense, less so on internal development workflows

Traditional supply chain attacks targeted Windows endpoints. Now, because macOS dominates developer workstations (73% of developers use macOS according to Stack Overflow 2024), attackers have pivoted to macOS-specific techniques exploiting npm, node, Homebrew, and developer-focused social engineering.


Observed Patterns:

  • Malicious npm package (https-proxy-utils) dropping AdaptixC2 on macOS via postinstall scripts and persisting via LaunchAgents.
  • DPRK-aligned deceptive behavior targeting developers with trojan scripts named like real tools (e.g., patch.sh).

Detection implication:

  • Explicit "dev supply chain" detection pack:
    • npm/node spawning shell, curl, or LaunchAgent creation.
    • New LaunchAgents linked to tools, package managers, or IDEs.
    • Suspicious scripts and binaries introduced via recruitment/job flows or CI/CD.
unc5142-etherhiding-fig18.max-1000x1000

Real-World Usage:

  • AdaptixC2 Campaign (October 2025): Malicious npm package https-proxy-utils mimicked legitimate proxy utilities (which have 70-90M weekly downloads), deployed AdaptixC2 C2 framework via postinstall scripts, persisted via LaunchAgents on macOS.
  • Shai-Hulud Worm (September 2025): Self-replicating npm worm compromised 500+ npm packages including @ctrl/tinycolor (2M+ weekly downloads) and CrowdStrike packages.
  • Shai-Hulud 2.0 "The Second Coming" (November 2025): Resurgence affecting Zapier, ENS Domains, PostHog, Postman packages. 25,000+ GitHub repos compromised across ~500 users.

Detections (for Anvilogic customers):

Get trending threats published weekly by the Anvilogic team.

Sign Up Now