Everything is getting hacked
If you work in tech, your feed in April 2026 probably looks like a security incident ticker. Vercel breached through a compromised AI tool. Axios hijacked by North Korean state actors. Bitwarden's CLI package poisoned via a cascading GitHub Actions attack. Lovable caught exposing user data through a basic authorization flaw. React Native packages silently serving malware to 130,000 developers. iOS exploit kits that once cost millions now showing up in the wild, targeting ordinary users. It's not one event. It's a pattern. And the pattern is accelerating.
The npm supply chain is on fire
The JavaScript ecosystem has had a brutal few months. The attacks aren't hypothetical or theoretical anymore. They're hitting packages that millions of developers depend on every single day.
On March 31, Axios, the HTTP client with over 100 million weekly npm downloads, was compromised. An attacker hijacked the lead maintainer's npm account, changed the registered email to an attacker-controlled ProtonMail address, and published two malicious versions (1.14.1 and 0.30.4) directly via the npm CLI. The poisoned packages introduced a phantom dependency called plain-crypto-js that deployed a cross-platform remote access trojan on macOS, Windows, and Linux. The malware erased itself after installation, leaving no trace in node_modules. Microsoft Threat Intelligence attributed the attack to Sapphire Sleet, a North Korean state actor. Google linked it to UNC1069, a group known for targeting cryptocurrency companies.
The attack completely bypassed GitHub's protections. There were no corresponding git tags, commits, or release branches in the Axios repository. The malicious versions existed only on npm.
Weeks earlier, two popular React Native packages, react-native-international-phone-number and react-native-country-select, were published with malicious install-time code execution. The attack was linked to a threat actor called Glassworm, which went on to compromise over 150 additional npm packages using invisible Unicode characters to hide malicious payloads.
Then came the TeamPCP campaign, possibly the most alarming of them all. Starting on March 19, the group compromised Aqua Security's Trivy vulnerability scanner, one of the most widely used open-source security tools in the cloud-native ecosystem. They poisoned 76 of 77 GitHub Action version tags, turning a security scanner into a credential stealer. Within days, the attack cascaded into Checkmarx's KICS and AST GitHub Actions, Docker Hub images, OpenVSX extensions, the LiteLLM Python package on PyPI, and eventually into Bitwarden's CLI.
The Bitwarden compromise on April 22 was a downstream result of the same campaign. A malicious version of @bitwarden/[email protected] was published through a compromised GitHub Action in Bitwarden's CI/CD pipeline. The package contained credential-stealing code targeting crypto wallet data, SSH keys, and environment variables. Bitwarden contained it within about 90 minutes, and confirmed no end-user vault data was accessed, but the implications were chilling: a single compromised GitHub Action had given attackers persistent workflow injection access to every CI/CD pipeline the developer's token could reach.
Platform breaches are hitting close to home
The supply chain attacks are bad enough. But the platform-level breaches make the picture even grimmer. On April 19, Vercel disclosed a security incident involving unauthorized access to internal systems. The attack chain started not with Vercel itself, but with Context.ai, a third-party AI productivity tool. A Context.ai employee had their device compromised after downloading game exploits (reportedly a Roblox cheat), which installed Lumma Stealer, an infostealer that quietly harvested every credential the browser had saved. Those credentials sat in a criminal marketplace for two months before someone figured out what they were worth. A Vercel employee had installed a Context.ai browser extension, which the attackers used to pivot into their Google Workspace account. From there, they accessed Vercel's internal environment variables, specifically the ones not marked as "sensitive," which could be decrypted to plaintext. The ShinyHunters hacking group listed the stolen data on a cybercriminal forum for $2 million, claiming access to customer API keys, source code, and database data. The Lovable incident was different in character but equally concerning. On April 20, a security researcher publicly disclosed that any authenticated Lovable user could access other users' source code, database credentials, AI chat histories, and customer data, simply by having a project link. The vulnerability was a textbook Broken Object Level Authorization (BOLA) flaw on Lovable's own platform API. The researcher had reported the bug 48 days earlier through Lovable's bug bounty program. It was marked as a duplicate and left open. Lovable initially denied it was a breach before eventually apologizing and shipping a fix.
iOS is no longer the safe haven
For years, iPhones have been considered the gold standard of consumer device security. That reputation took serious damage in 2026. In February, Apple patched CVE-2026-20700, a zero-day memory corruption vulnerability in dyld (Apple's Dynamic Link Editor) that had been exploited in what Apple described as "extremely sophisticated" targeted attacks. It was the first actively exploited zero-day Apple disclosed in 2026. Then came the exploit kits. In March, Google Threat Intelligence Group published research on Coruna, a powerful iOS exploit kit featuring five full exploit chains and 23 individual exploits targeting iOS versions 13.0 through 17.2.1. The kit had been developed as a government surveillance tool but had leaked into the broader threat landscape. DarkSword followed shortly after. Discovered by Lookout, iVerify, and Google, DarkSword targeted iPhones running iOS 18.4 through 18.7 with zero-click attacks, meaning no user interaction was required. The exploit kit was adopted by multiple threat actors and used in infostealer campaigns against ordinary users, not just the high-value targets that mobile exploits traditionally go after. As Kaspersky noted, before DarkSword and Coruna, most iPhone users didn't need to worry about their data security. That era appears to be over. In April, Apple released iOS 26.4.2 to patch CVE-2026-28950, a flaw that allowed deleted Signal messages to be recovered from iOS notification logs. The vulnerability came to light after the FBI used it to access Signal messages on a suspect's device, even though the app had been deleted and messages were set to disappear.
Why is everything happening at once?
The sheer volume of incidents in early 2026 feels unprecedented. But there are structural reasons for it. The supply chain attack surface has exploded. Modern software is built on layers of dependencies. A single React application might pull in hundreds of npm packages, each maintained by individuals or small teams. Compromising one maintainer account can cascade across millions of installations. The Axios attack reached over 100 million weekly downloads. The Trivy compromise hit thousands of CI/CD pipelines. The blast radius of a single breach is orders of magnitude larger than it was a decade ago. AI is accelerating both sides. Chainguard's 2026 analysis found that malicious packages on public repositories increased by 75% in 2025, cloud intrusions increased by 35%, and AI-generated phishing began outperforming human red teams entirely. The attackers are using AI to find vulnerabilities faster, generate more convincing social engineering campaigns, and automate exploitation. At the same time, developers are using AI to write code faster, often without fully understanding the security implications of what they're shipping. The trust model is fundamentally broken. The Vercel breach didn't start with Vercel. It started with an employee installing an AI browser extension. The Bitwarden compromise didn't start with Bitwarden. It started with a GitHub Action from Checkmarx, which was compromised because of TeamPCP's attack on Trivy. SecurityScorecard's 2026 report found that 78% of organizations admit their cybersecurity programs cover less than 50% of their vendor ecosystem. We've built our infrastructure on a web of implicit trust, and attackers have figured out that the weakest link is almost never the primary target. Nation-state actors are targeting developer tools. The Axios compromise was attributed to North Korean state actors. The TeamPCP campaign hit security scanning tools used across the industry. These aren't script kiddies or opportunistic criminals. These are well-resourced groups systematically targeting the tools developers use to build and secure software.
What can actually be done?
There's no silver bullet, but there are practical steps that meaningfully reduce risk.
Lock down your supply chain. Pin dependencies to exact versions. Use lockfiles. Audit what runs during npm install, because postinstall hooks are the primary vector for npm supply chain attacks. Tools like Socket, StepSecurity, and Endor Labs are built specifically for this.
Treat every third-party integration as an attack surface. The Vercel breach happened through a browser extension. Review what OAuth apps and extensions have access to your accounts. Remove anything you're not actively using. Apply the principle of least privilege to every integration.
Rotate credentials proactively, not reactively. If you use Vercel, Axios, Bitwarden CLI, Trivy, Checkmarx, or any of the other affected tools, rotate every secret that could have been exposed. Don't wait for confirmation that your specific instance was compromised.
Update your devices. Apple patched the DarkSword exploits, the dyld zero-day, and the Signal notification flaw. But patches only help if you install them. Keep automatic updates enabled.
Assume breach. The organizations that responded best, Bitwarden containing their incident in 90 minutes, Vercel's detailed disclosure timeline, did so because they had incident response plans and monitoring in place before the attacks happened. The ones that fumbled, like Lovable dismissing a valid bug report for 48 days, paid for it in trust.
The uncomfortable truth is that the tools and platforms we depend on are only as secure as their weakest dependency, their most careless employee, or the AI tool someone installed without thinking twice. In 2026, the attack surface isn't just your code. It's everything your code touches, and everything those things touch in turn.
Everything is getting hacked because everything is connected. And the connections are the vulnerability.
References
- Vercel, "Vercel April 2026 security incident." https://vercel.com/kb/bulletin/vercel-april-2026-security-incident
- TechCrunch, "App host Vercel says it was hacked and customer data stolen." https://techcrunch.com/2026/04/20/app-host-vercel-confirms-security-incident-says-customer-data-was-stolen-via-breach-at-context-ai/
- Forbes, "How A Roblox Cheat Download Triggered A $2 Million Hack At Vercel." https://www.forbes.com/sites/jonmarkman/2026/04/21/how-a-roblox-cheat-download-triggered-a-2-million-hack-at-vercel/
- Microsoft Security Blog, "Mitigating the Axios npm supply chain compromise." https://www.microsoft.com/en-us/security/blog/2026/04/01/mitigating-the-axios-npm-supply-chain-compromise/
- Google Cloud Blog, "North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack." https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package
- Elastic Security Labs, "Inside the Axios supply chain compromise, one RAT to rule them all." https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all
- CISA, "Supply Chain Compromise Impacts Axios Node Package Manager." https://www.cisa.gov/news-events/alerts/2026/04/20/supply-chain-compromise-impacts-axios-node-package-manager
- StepSecurity, "Malicious npm Releases Found in Popular React Native Packages." https://www.stepsecurity.io/blog/malicious-npm-releases-found-in-popular-react-native-packages---130k-monthly-downloads-compromised
- Wiz, "Trivy Compromised: Everything You Need to Know about the Latest Supply Chain Attack." https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack
- SANS Institute, "When the Security Scanner Became the Weapon: Inside the TeamPCP Supply Chain Campaign." https://www.sans.org/blog/when-security-scanner-became-weapon-inside-teampcp-supply-chain-campaign
- The Hacker News, "Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign." https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
- Bitwarden Community Forums, "Bitwarden Statement on Checkmarx Supply Chain Incident." https://community.bitwarden.com/t/bitwarden-statement-on-checkmarx-supply-chain-incident/96127
- Lovable, "Our response to the April 2026 incident." https://lovable.dev/blog/our-response-to-the-april-2026-incident
- The Register, "Lovable denies data leak, cites 'intentional behavior'." https://www.theregister.com/2026/04/20/lovable_denies_data_leak/
- SOC Prime, "CVE-2026-20700: Apple Patches Zero-Day Exploited in Sophisticated Cyber Attacks." https://socprime.com/blog/cve-2026-20700-vulnerability/
- Google Cloud Blog, "Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit." https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit
- Google Cloud Blog, "The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors." https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
- Kaspersky, "The iPhone, invincible no more: a look at DarkSword and Coruna." https://www.kaspersky.com/blog/ios-exploits-darksword-and-coruna-in-mass-attacks/55622/
- Forbes, "iOS 26.4.2: Apple Fixes iPhone Flaw Used By FBI To Read Deleted Messages." https://www.forbes.com/sites/davidphelan/2026/04/23/ios-2642-apple-issues-unexpected-iphone-update-to-block-fbi-data-extraction-method/
- Chainguard, "2026: The year of AI-assisted attacks." https://www.chainguard.dev/unchained/2026-the-year-of-ai-assisted-attacks
- SecurityScorecard, "2026 Supply Chain Cybersecurity Trends Report." https://securityscorecard.com/resources/research/2026-supply-chain-cybersecurity-trends-report/
- Trend Micro, "The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables." https://www.trendmicro.com/en_us/research/26/d/vercel-breach-oauth-supply-chain.html