HomeIntelligenceBrief
BREACH BRIEF⚪ Informational ThreatIntel

Security Affairs Malware Newsletter Round 92 Highlights npm Supply‑Chain RCE, Cryptomining Proxies, and Government‑Targeted Campaigns

The April 2026 Security Affairs Malware Newsletter reports 36 new malware activities, notably malicious npm Strapi packages delivering Redis RCE, Python‑based LNK backdoors, and attempts to turn ComfyUI servers into cryptomining proxies. These trends raise supply‑chain and cloud‑service risks for third‑party risk managers.

LiveThreat™ Intelligence · 📅 April 13, 2026· 📰 securityaffairs.com
Severity
Informational
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
securityaffairs.com

Security Affairs Malware Newsletter Round 92 Highlights Surge in npm Supply‑Chain RCE, Cryptomining Proxies, and Government‑Targeted Campaigns

What Happened — The April 12 2026 edition of Security Affairs’ Malware Newsletter aggregates 36 recent malware developments, including 36 malicious npm Strapi packages delivering Redis RCE and data theft, new Python‑based LNK backdoors from the Kimsuky group, and attempts to weaponize ComfyUI servers as cryptomining proxy botnets.

Why It Matters for TPRM

  • Supply‑chain compromises in widely‑used npm packages can cascade to any organization that integrates them, expanding the attack surface of third‑party software.
  • Emerging cryptomining proxy tactics target AI‑model hosting environments, potentially exposing cloud‑service contracts to abuse.
  • Government‑focused campaigns (e.g., Pawn Storm’s PRISMEX) illustrate heightened geopolitical risk for vendors serving public‑sector clients.

Who Is Affected — Technology/SaaS vendors, cloud service providers, AI/ML platform operators, government contractors, and any organization that relies on npm packages or ComfyUI‑based services.

Recommended Actions

  • Conduct an inventory of npm dependencies and enforce strict version‑pinning and provenance verification.
  • Review cloud‑hosted AI/ML workloads for unauthorized outbound connections and implement network‑level egress controls.
  • Re‑assess third‑party risk for vendors handling government or critical‑infrastructure data, ensuring they have robust threat‑intel monitoring.

Technical Notes

  • Attack vectors: supply‑chain injection via malicious npm packages, malicious LNK files, abuse of open‑source AI model servers, and targeted phishing for credential harvesting.
  • Relevant CVEs: CVE‑2026‑34621 (Adobe Reader RCE) mentioned in the newsletter; no new CVEs directly tied to the npm or ComfyUI incidents.
  • Data types exposed: Redis databases, potentially sensitive configuration files, and command‑and‑control (C2) channels for cryptomining.

Source: Security Affairs Malware Newsletter Round 92

📰 Original Source
https://securityaffairs.com/190672/malware/security-affairs-malware-newsletter-round-92.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.