Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

530+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. The Good, the Bad and the Ugly in Cybersecurity – Week 14
The Good, the Bad and the Ugly in Cybersecurity – Week 14
NEWS

The Good, the Bad and the Ugly in Cybersecurity – Week 14

SentinelOne intercepts a LiteLLM supply chain attack in real time, attackers weaponize the Axios npm package to deploy a cross-platform RAT, and a Chrome zero-day enables remote code execution.

Dylan H.

News Desk

April 3, 2026
4 min read

SentinelOne's weekly cybersecurity roundup for Week 14 of 2026 covers three major storylines: a supply chain attack on the LiteLLM AI package stopped in real time, the weaponization of the Axios HTTP library against developers, and a new Chrome zero-day enabling remote code execution.


The Good: SentinelOne Stops LiteLLM Supply Chain Attack in Real Time

In a rare example of a supply chain attack being stopped as it unfolded, SentinelOne researchers detected and blocked a malicious version of the LiteLLM Python package before it could cause widespread harm. LiteLLM is a popular open-source library used to route API calls across multiple large language model providers — widely used in AI application development.

The malicious package version contained a backdoor designed to:

  • Exfiltrate environment variables (commonly used to store API keys for OpenAI, Anthropic, and other AI providers)
  • Establish persistence on compromised developer machines
  • Harvest credentials stored in cloud configuration files

SentinelOne's detection was credited to behavioral analysis flagging unusual package behavior at install time. The malicious version was quickly removed from PyPI, but not before being downloaded by a number of organizations — several of which have since disclosed breaches tied to the incident, including Mercor, the AI hiring platform.

This incident follows a growing pattern of threat actors targeting AI tooling supply chains, recognizing that developers working on AI applications often hold valuable API keys and cloud credentials.


The Bad: Axios npm Package Weaponized to Deploy Cross-Platform RAT

The Axios JavaScript HTTP client — one of the most downloaded packages in the npm ecosystem — was weaponized in a sophisticated supply chain attack attributed to North Korean threat group UNC1069. A malicious version of the package was pushed to npm via a compromised maintainer account, and was downloaded by thousands of developers before being detected.

Attack DetailDescription
Packageaxios (npm)
Attack MethodCompromised maintainer account
PayloadCross-platform remote access trojan (RAT)
AttributionUNC1069 (North Korea-linked)
TargetsJavaScript developers, CI/CD pipelines

The malicious version deployed a cross-platform RAT capable of running on Windows, macOS, and Linux. The trojan established a persistent backdoor on developer machines and CI/CD build environments, potentially enabling the attackers to:

  • Steal source code from compromised developer workstations
  • Inject malicious code into software being built in compromised CI/CD environments
  • Exfiltrate credentials, API keys, and secrets stored in development environments

Google's Threat Intelligence Group (GTIG) separately attributed the attack to North Korean operators, consistent with UNC1069's prior campaigns targeting software developers and cryptocurrency projects.


The Ugly: Chrome Zero-Day Enables Remote Code Execution

A new zero-day vulnerability in Google Chrome — designated CVE-2026-5281 — was disclosed and patched this week after being found under active exploitation. The flaw, a type confusion vulnerability in the V8 JavaScript engine, enables remote code execution when a victim visits a specially crafted webpage.

This marks the fourth Chrome zero-day exploited in the wild in 2026, maintaining a concerning cadence of browser-based RCE vulnerabilities.

AttributeDetail
CVECVE-2026-5281
ComponentV8 JavaScript Engine
TypeType Confusion
ImpactRemote Code Execution
ExploitationConfirmed in the wild
Fixed inChrome 136.x

Exploitation was reported against both Windows and macOS targets. Google has not publicly attributed the exploitation activity but noted that it was used in targeted attacks — a phrase typically indicating nation-state or sophisticated cybercriminal involvement.

Users and organizations should ensure Chrome is updated to the latest version immediately.


Key Takeaways for Security Teams

  1. AI tooling is now a prime supply chain target — developers building AI applications should verify package integrity and monitor for unauthorized LiteLLM or other AI SDK versions in their environments

  2. Axios compromise underscores npm ecosystem risk — even widely trusted, high-download packages can be compromised through maintainer account takeover; adopt lockfile pinning and integrity verification in CI/CD

  3. Patch Chrome immediately — CVE-2026-5281 is being actively exploited; organizations should push the update via MDM or patch management tooling as a priority

  4. Rotate any credentials exposed in compromised dev environments — if LiteLLM or Axios malicious versions ran in your environment, treat all stored API keys and cloud credentials as compromised


Source: SentinelOne — April 3, 2026

#Zero-Day#Supply Chain#Chrome#LiteLLM#Axios#SentinelOne#Weekly Recap

Related Articles

Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

AI hiring platform Mercor has confirmed a security incident linked to the LiteLLM PyPI supply chain attack carried out by TeamPCP. Separately, Lapsus$ claimed on its website to have obtained hundreds of gigabytes of Mercor's data.

6 min read

Axios NPM Package Breached in North Korean Supply Chain Attack

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored versions of the widely used Axios HTTP library, in an attack now attributed to North Korean threat actor UNC1069.

6 min read

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google's Threat Intelligence Group has formally attributed the supply chain compromise of the popular Axios npm package to UNC1069, a financially motivated North Korean threat activity cluster with a history of targeting developer tooling, cryptocurrency platforms, and software supply chains.

6 min read
Back to all News