Five new facts about the tj-actions attack

Jun 03, 25

An excalidrawn infographic of these details

  1. Outside of the attack chain starting with spotbugs and leading to the tj-actions compromise, the attacker actually hit two other targets on December 5th (targets have been notified) [1]
  2. The attackers’ first activity, taking place the same day as the Ultralytics news broke, involved bad attempts to leverage similar XMRig payloads against ultralytics [2]
  3. You can look at commit signing and branch names (e.g patch-1) to track the attacker evolving from working in the UI to using CLI tooling
  4. The jurkaofavak payload was generated using Gato-X [3]
  5. There is a lot we can assume based on the inconsistent TTPs here. In short, this to me looks like someone with little relevant knowledge at the outset, clearly gradually improving their tactics by consuming the relevant security research

[1] https://lnkd.in/e3GAjX7X, https://lnkd.in/e_R9SsR5 [2] https://lnkd.in/eMekSsDt [3] https://lnkd.in/eTRY2UeX