This week we’re introducing a new blog series: Satine Sentinel, our weekly analysis of cyber incidents that matter.

Every week, we’ll analyze 3-5 significant attacks, breaking down what happened, how the attack worked, and why defenders should care. You’ll get technical details from an offensive operator’s perspective, not vendor marketing or surface-level reporting. For particularly significant incidents, we may even do a separate deep dive.

This isn’t another breach roundup. We focus on incidents demonstrating adversary TTP evolution, supply chain risk, or novel attack patterns worth understanding. Each incident includes attack methodology, defensive implications, and links to vendor analysis and technical writeups.

This week: three supply chain attacks broke trust in developer tooling, SaaS integrations, and emergency response systems, showing how cascading failures turn third-party dependencies into single points of catastrophic failure.

Shai-Hulud 2.0: Self-Replicating npm Worm Returns

What happened:

On November 24, 2025, security researchers identified a second wave of the Shai-Hulud npm supply chain attack, dubbed “The Second Coming” by the attackers. The worm compromised 796+ npm packages totaling over 20 million weekly downloads, including packages from Zapier, ENS Domains, PostHog, and Postman. The attack executed during the preinstall phase, dramatically widening impact across developer machines and CI/CD pipelines.

Over 500 GitHub users had credentials exfiltrated to public repositories marked “Sha1-Hulud: The Second Coming,” with 25,000+ malicious repos created. The attack peaked early morning November 24 UTC, creating ~1,000 new repos every 30 minutes.

Technical details that matter:
Why you should care:

This represents supply chain risk at cloud-native scale. The 20% of infections on GitHub Actions runners means CI/CD pipeline compromise: the infrastructure most organizations use for software deployment. When your build pipeline is compromised, every deployment becomes a potential backdoor installation. The memory-scraping capabilities captured runtime secrets that never appeared in code repositories, including production database credentials and API keys with elevated privileges. Entro Security analysis found exfiltrated data from 1,195 distinct organizations including major banks, government bodies, and Fortune 500 technology firms, including one compromised semiconductor company’s self-hosted GitHub Actions runner exposed production environment secrets. The destructive failsafe shows adversary willingness to cause operational damage when detection occurs, turning incident response into a race against data destruction.

Key sources:

Gainsight OAuth Token Breach: 200+ Salesforce Instances Compromised

What happened:

On November 20, 2025, Salesforce disclosed unauthorized access to customer data through compromised Gainsight-published applications. Google Threat Intelligence Group confirmed over 200 potentially affected Salesforce instances, with ShinyHunters/Scattered Lapsus$ Hunters claiming responsibility. Attack activity began November 8, 2025 with reconnaissance, followed by unauthorized access between November 16-23 from IP addresses associated with commercial VPN services, Tor network, and AWS.

This is the second major Salesforce supply chain attack in three months; the previous Salesloft Drift breach in August affected 760+ companies. ShinyHunters claims the combined Salesloft and Gainsight campaigns allowed them to steal data from nearly 1,000 organizations. Salesforce revoked all OAuth tokens associated with Gainsight apps and temporarily removed them from AppExchange. HubSpot and Zendesk integrations also suspended as precautionary measure.

Technical details that matter:
Why you should care:

This attack pattern targets the SaaS integration trust model that virtually all organizations depend on. When your CRM, customer success platform, and support systems share OAuth credentials, a single third-party compromise exposes your entire customer data ecosystem. The breach shares strong similarities with the Salesloft Drift attacks three months prior, linked to the same threat cluster (ShinyHunters/UNC6240), indicating sustained focus on Salesforce ecosystem supply chain—this is the same threat cluster’s third major campaign against Salesforce integrations in 2025. For organizations using Salesforce, these OAuth-based attacks can bypass their perimeter security entirely.

The data accessed includes business contact details, licensing information, and support case contents, exactly the relationship intelligence that enables social engineering attacks against high-value targets. The three-month persistence window before detection means adversaries had time to map your organization, identify high-privilege accounts, and establish additional footholds.

Key sources:

CodeRED Emergency Alert System: INC Ransom Cripples Critical Infrastructure

What happened:

On November 25-26, 2025, Crisis24 confirmed its OnSolve CodeRED platform suffered a ransomware attack that disrupted emergency notification systems used by state and local governments, police departments, and fire agencies across the United States. INC Ransom group gained unauthorized access on November 1, 2025, followed by file encryption on November 10 that triggered a nationwide outage. The attack forced Crisis24 to permanently decommission the legacy CodeRED environment, and restore functionality using backups from March 31, 2025.

INC Ransom published screenshots showing customer data including email addresses and clear-text passwords, plus negotiation logs showing initial $950,000 ransom demand reduced to $450,000, with Crisis24 offering $100,000-$150,000 which was rejected. Douglas County Sheriff’s Office in Colorado terminated their CodeRED contract entirely. Stolen data includes names, addresses, email addresses, phone numbers, and clear-text passwords used for CodeRED user profiles.

Technical details that matter:
Why you should care:

This demonstrates that mission-critical public safety infrastructure operates on surprisingly fragile technical foundations. When CodeRED goes down or cannot be trusted, communities may miss evacuation orders, severe weather warnings, or active-shooter alerts when minutes matter. For hospitals with emergency department surge alerts, utilities with power restoration notifications, or government agencies with shelter-in-place systems, you’re likely using similar third-party mass notification platforms with comparable security postures. Crisis24’s FAQ section states “Unfortunately, there have been rising cybersecurity risks and penetrations across many organizations as of late”, which heavily implies they believe cyber incidents with disastrous effects are unavoidable. This is, of course, not true; while ransomware can be difficult to prevent, storing passwords in cleartext has been inexcusable for decades.

The plaintext password storage indicates CodeRED was built without basic security architecture, suggesting other legacy emergency systems may have similar design flaws. Law enforcement agencies terminated contracts due to lack of proactive notification about the outage and breach, forcing them to rely on social media and door-to-door alerts as temporary measures. When your emergency notification system fails, you discover you have no backup communication channel to inform responders or citizens. The November timing (wildfire season in California, tornado season in South, approaching winter storms) maximized operational impact when communities most needed reliable alert capabilities.

Key sources:

The Pattern this Week

Supply chain attacks aren’t just compromising software dependencies, they’re breaking the trust models that modern operations depend on. When your npm packages steal credentials, your SaaS integrations leak OAuth tokens, and your emergency notification vendor stores passwords in cleartext, you’re learning that third-party risk isn’t a compliance checkbox. It’s the primary attack surface. Every integration is a potential breach, every vendor a possible single point of failure, and every “trusted” system an opportunity for adversaries to scale their operations across hundreds or thousands of downstream victims simultaneously.

See you next week.

Final CTA Section
GET STARTED

Ready to Strengthen Your Defenses?

Whether you need to test your security posture, respond to an active incident, or prepare your team for the worst: we’re ready to help.

📍 Based in Atlanta | Serving Nationwide

Discover more from Satine Technologies

Subscribe now to keep reading and get access to the full archive.

Continue reading