
Research
/Security News
npm Malware Campaign Uses Adspect Cloaking to Deliver Malicious Redirects
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.


Sarah Gooding
March 17, 2025
A widely-used GitHub Action, tj-actions/changed-files, was compromised in a supply chain attack over the weekend. It was first spotted by StepSecurity after they detected an unexpected endpoint in network traffic. On March 14–15, 2025, a threat actor gained access to the action’s repository, likely via a stolen credential, and modified version tags (v1 through v45.0.7) to point to a malicious commit. This commit injected code into workflows using the action, causing sensitive secrets from CI/CD runs to be printed into the workflow logs. The issue has been assigned CVE-2025-30066. The maintainers have since reverted the malicious changes, but not before many projects were affected.
The impact of this attack is significant. Over 23,000 repositories actively use tj-actions/changed-files, with around a million monthly downloads. Any workflow that pulled the malicious version would expose its secrets—including API keys, authentication tokens, and passwords—within CI/CD logs. For public repositories, this effectively made secrets accessible to anyone viewing the logs. Even for private repositories, organizations should assume their secrets were compromised since the attacker’s code had access to them.
As a result, developers and companies must now rotate potentially compromised credentials and audit their workflows to ensure they are no longer using affected versions. The incident demonstrates how even simple and trusted actions can become attack vectors, causing widespread consequences for downstream users.
If your organization used tj-actions/changed-files, immediate action is necessary:
To prevent similar supply chain attacks, developers should adopt the following best practices:
This incident highlights a concerning trend: attackers are increasingly targeting GitHub Actions and CI/CD workflows as an entry point for supply chain attacks. By compromising a popular GitHub Action, an attacker can instantly affect thousands of downstream projects. Similar incidents in the past have included compromised workflows leaking publishing tokens, allowing attackers to push malicious software updates, as recently seen in the Ultralytics supply chain attack.
As more organizations rely on GitHub Actions for automation, securing CI/CD infrastructure is as critical as securing application code. When including a third-party GitHub Action, developers are effectively executing someone else’s code in their environment. Organizations must treat their build systems as production environments—locking down dependencies, monitoring for anomalies, and enforcing stricter access controls to continue leveraging automation safely.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.

Security News
PyPI adds Trusted Publishing support for GitLab Self-Managed as adoption reaches 25% of uploads