Raphael Silva
38 posts

Raphael Silva
@0x_rcss
Security Researcher @ Aikido Security
Katılım Mart 2014
138 Takip Edilen214 Takipçiler

Its seems like this guy found something that could destroy the internet 🤯
hackerone.com/rcss?type=user

English

@kubolos231 @Magn4_ @goldenape36 It is! Just submitted a talk to DEF CON a few days ago about this issue 😄🤞
English

@Magn4_ @goldenape36 "Just a security researcher who likes web and supply-chain stuff :)" -> Supply chain seems like valid scenario here
English

@Magn4_ Just submitted a talk to DEF CON a few days ago about this finding, guess we'll have to wait and see 😉
English
Raphael Silva retweetledi

A new npm supply-chain compromise is targeting SAP developer workflows.
Mini Shai-Hulud follows a familiar pattern, but with a smaller package set and a serious secret-stealing payload built to hit developer machines and CI/CD environments.
Affected packages we’re tracking:
- cap-js/sqlite v2.2.2
- cap-js/postgres v2.2.2
- cap-js/db-service v2.10.1
- mbt v1.2.48
If any of these touched your environment, rotate secrets and review GitHub, npm, cloud, and CI activity.

English
Raphael Silva retweetledi
Raphael Silva retweetledi

imagine getting hacked by a RAT just to use ChatGPT

Aikido Security@AikidoSecurity
Malicious npm and PyPI packages are turning servers into LLM proxy nodes. Packages like `kube-health-tools` (npm) and `kube-node-health` (PyPI) install a hidden proxy that routes AI traffic through the compromised machine, along with SSH tunnels and full remote access. Within seconds of install, they wipe evidence by deleting the package and files from disk.
English
Raphael Silva retweetledi

We are actively seeing TeamPCP modify the CanisterWorm payload, seemingly debugging in production. Classic tactic. But it doesn't change the fact that this is a very bad situation, given all the data the threat actor likely stole through the Trivy breach.
aikido.dev/blog/teampcp-d…
English
Raphael Silva retweetledi
Raphael Silva retweetledi

There appears to be a new worm on NPM that has active community spread.
All packages by `@EmilGroup` on NPM were replaced with this self-spreading payload:
@emilgroup/customer-sdk?activeTab=code" target="_blank" rel="nofollow noopener">npmjs.com/package/@emilg…

English
Raphael Silva retweetledi

New research by @0x_rcss on the compromise of a popular OpenVSX extension by BlokTrooper:
aikido.dev/blog/fast-draf…
English

@BrighterCommand Hi! I'm a security researcher, do you know where/how is the best way to report a security issue to the project? Thanks!
English
Raphael Silva retweetledi

Yes, we've heard a little noise about the semi-popular #ChatMoss #VSCode extension that appears to be malicious. We reported it on 31. Oct 2025, in fact; shortly after we began our ongoing campaign to monitor the VSCode and OpenVSX marketplaces. The extension ID is WhenSunset[.]chatgpt-china ; for whatever reason, in this case the marketplace folks decided to take no action.
It's not new, it's not news, but it is a good reminder to be cautious; marketplace maintainers can be reluctant to remove things without "smoking gun" evidence of malice.
#WhenSunset #VSCodeExtension #Malware #SupplyChainSecurity #OpenSourceSecurity

English
Raphael Silva retweetledi

🗣️ SPEAKER Announcement
#BlackAlps25 is glad to propose you a talk from Raphael Silva @0x_rcss, Security Researcher at @Checkmarx specializing in security research, SAST methodologies, and Supply Chain Security.
📅 Friday, November 21st
🕞 11h15-11h45
📗 lnkd.in/ex7X8BQe

English






