When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Many developers apparently trusted the tool without checking for changes, executing themalicious codeand exposing sensitive credentials.

Ars Technicanoted security researchers from Wiz already found dozens of users who were harmed in this attack.

A graphic showing someone on a tablet working through a supply chain.