<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NPM supply chain attack detection? in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285887#M37542</link>
    <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/23530"&gt;@christian_kreuz&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Besides being affected or for forensics purposes, I was more wondering about detecting them before being impacted?&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2025 12:46:37 GMT</pubDate>
    <dc:creator>AntonioSousa</dc:creator>
    <dc:date>2025-09-12T12:46:37Z</dc:date>
    <item>
      <title>NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285819#M37533</link>
      <description>&lt;P&gt;Just wondering how, if, it is possible to detect situations like the one that involved NPM some days ago, with Dynatrace?&lt;BR /&gt;&lt;A href="https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/" target="_blank" rel="noopener"&gt;https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 06:51:42 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285819#M37533</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2025-09-24T06:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285821#M37534</link>
      <description>&lt;P&gt;I was wondering the same thing&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2025 16:55:07 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285821#M37534</guid>
      <dc:creator>Kenny_Gillette</dc:creator>
      <dc:date>2025-09-11T16:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285885#M37540</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are monitoring logs of your CI/CD pipeline, NPM Cache / Proxy, or even Renovate, you might be able to find the log output containing one of these malicious packages:&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;fetch logs
| search "*is-arrayish*"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My advise is to check which systems are monitored, and then narrow down the filters to a specialized query for those systems.&lt;/P&gt;&lt;P&gt;You can then re-use that when the next supply chain attack hits the world.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 12:02:19 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285885#M37540</guid>
      <dc:creator>christian_kreuz</dc:creator>
      <dc:date>2025-09-12T12:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285887#M37542</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/23530"&gt;@christian_kreuz&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Besides being affected or for forensics purposes, I was more wondering about detecting them before being impacted?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 12:46:37 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285887#M37542</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2025-09-12T12:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285890#M37543</link>
      <description>&lt;P&gt;So if I see this then there is still an issue?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 13:03:20 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285890#M37543</guid>
      <dc:creator>Kenny_Gillette</dc:creator>
      <dc:date>2025-09-12T13:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285942#M37553</link>
      <description>&lt;P&gt;I am not aware that Dynatrace has a built-in solution that can catch a supply chain attack - at least not in an early stage in the CI/CD pipeline.&lt;/P&gt;&lt;P&gt;One thing that might work into that direction is Runtime Vulnerability Analytics:&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/secure/application-security/vulnerability-analytics" target="_blank"&gt;https://docs.dynatrace.com/docs/secure/application-security/vulnerability-analytics&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Though in that case, you already have that vulnerable dependency deployed somewhere, therefore someone might already have successfully exploited the supply chain attack.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 06:14:27 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285942#M37553</guid>
      <dc:creator>christian_kreuz</dc:creator>
      <dc:date>2025-09-15T06:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285943#M37554</link>
      <description>&lt;P&gt;You need to check the logs in detail. If you still see a certain dependency in a certain version being used in logs, then it's worthwhile investigating (could be a Pull Request Build, could be a release build, ...).&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 06:18:39 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/285943#M37554</guid>
      <dc:creator>christian_kreuz</dc:creator>
      <dc:date>2025-09-15T06:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/286021#M37565</link>
      <description>&lt;P&gt;Hello Antonio,&lt;/P&gt;&lt;P&gt;I'm currently working on a sample workflow that fetches malicious packages from OSV and compares them to monitored entities. It's currently a prototype, but the final version will create detection findings so they appear in the Threats &amp;amp; Exploits app.&lt;/P&gt;&lt;P&gt;Is that going into the direction you're thinking of?&lt;/P&gt;&lt;P&gt;If you'd like to provide feedback I'm happy to share the current version with you.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 13:50:20 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/286021#M37565</guid>
      <dc:creator>tfellinger</dc:creator>
      <dc:date>2025-09-15T13:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/286230#M37599</link>
      <description>&lt;P&gt;There's another nasty one that has been revealed to happen with 40+ NPM packages:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised" target="_blank"&gt;https://www.stepsecurity.io/blog/ctrl-tinycolor-and-40-npm-packages-compromised&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Sep 2025 20:25:25 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/286230#M37599</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2025-09-16T20:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: NPM supply chain attack detection?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/286620#M37642</link>
      <description>&lt;P&gt;If you use the Dynatrace module Runtime Vulnerability Analytics, affected packages will also be reported as they belong to our feeds (e.g. Snyk) so you will be notified by RVA if you use packages which are impacted.&lt;BR /&gt;This is a great way to democratize ownership of such activities.&lt;BR /&gt;&lt;BR /&gt;If you would like to build a sort of dashboard, it might be useful to build a Notebook used as a runbook (or a dashboard) to keep track. You could check NodeJS components used and their version, here is a nice article from Sam Bernardy detailing the type of notebook you could use&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.linkedin.com/pulse/beyond-scan-dynatrace-hunting-shai-hulud-data-samuel-bernardy-rqybc/?trackingId=D2fFwU3NRqSLIstq4duPiw%3D%3D" target="_blank"&gt;https://www.linkedin.com/pulse/beyond-scan-dynatrace-hunting-shai-hulud-data-samuel-bernardy-rqybc/?trackingId=D2fFwU3NRqSLIstq4duPiw%3D%3D&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 13:27:14 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/NPM-supply-chain-attack-detection/m-p/286620#M37642</guid>
      <dc:creator>mattia</dc:creator>
      <dc:date>2025-09-23T13:27:14Z</dc:date>
    </item>
  </channel>
</rss>

