Published on: Julyβ―26,β―2025
By: CyberDudeBivash Editorial Team
Website:cyberdudebivash.com
On Julyβ―20, 2025, attackers hijacked Toptalβs GitHub organizationβexposing 73 private repositories and injecting malicious code into their Picasso design system. They published ten trojanized npm packages under Toptalβs scope, downloaded approximately 5,000 times, delivering malware that exfiltrated GitHub authentication tokens and attempted to wipe victimsβ systems.(turn0search3, turn0search1)
Stage | Technique Used | Impact |
---|---|---|
GitHub breach | Attacker published altered Picasso code and pushed to npm registry | Exposed private code, deployed malware |
Token theft | preinstall script runs gh auth token via CLI and sends to attacker endpoint | Grants attacker GitHub access |
System wipe | postinstall script executes sudo rm -rf --no-preserve-root / (Linux), or silent deletes on Windows | Devastate developer systems |
The malicious packages included:
@toptal/picasso-tailwind
@toptal/picasso-charts
@toptal/picasso-shared
, etc., plus @xene/core
npm uninstall @toptal/picasso-*
preinstall
and postinstall
hooksβfor unauthorized lifecycle commands.βThis breach is a continuing reminder that developer tools themselves can become provenance chains for ransomware-level destruction,β says Socket security researchers. The incident was swiftly remediated: Toptal deprecated the malicious packages by Julyβ―23 and rolled back to safe versions.(turn0search3, turn0search16)
preinstall
, postinstall
) remain a major blindspot, capable of both credential theft and destructive operations.Share your strategies and observations in the comments or tweet us at @CyberDudeBivash.
Tags: #ToptalBreach #npmSupplyChainAttack #PicassoPackages #TokenTheft #SystemWipe #DeveloperSecurity #GitHubCompromise #CyberDudeBivash