01.12.25 Threat Report
This week's threat report. As we enter December 2025, we will explore the SHA1-Hulud supply chain attack that has infected over 800 npm packages, the ongoing cyber incident affecting multiple London councils, a significant data breach at British telecommunications provider Brsk involving over 230,000 customer records.
SHA1-Hulud Supply Chain Attack Affecting npm Packages
A significant supply chain attack, named SHA1-Hulud (Shai-Hulud 2.0), has compromised the npm (Node Package Manager) ecosystem, impacting over 800 software packages and counting. This attack introduces malicious code into trusted npm packages, meaning any developers who integrate these into their projects unknowingly include harmful components—potentially exposing thousands of organisations at once.
The breach was traced to a CI/CD workflow vulnerability at PostHog, where a compromised pull request initiated the spread of a worm that rapidly infected hundreds of packages. PostHog has acknowledged the incident, underlining the risks even security-focused companies can face from sophisticated supply chain threats.
Why This Matters
Supply chain attacks are a major threat to organisations, exploiting trusted relationships within the software ecosystem. When a widely used software package is compromised, thousands of organisations relying on it can be affected, resulting in security incidents that are challenging to manage.
For UK healthcare and public sector bodies, the risk is heightened. Many NHS trusts and government departments rely on digital services built with npm packages; compromised packages can lead to breaches, service outages, or unauthorised access to sensitive data.
This incident’s impact is extensive, with over 800 infected packages. Security teams must now audit their dependencies, a process that demands significant time and resources and can divert focus from other priorities.
Notably, the attack shows that even automated CI/CD pipelines—meant to speed up development—can be weaponised if not properly secured, allowing threats to propagate rapidly across digital environments.
Recommendations
- Perform an Immediate Software Audit: Collaborate with development teams to create an up-to-date inventory of all npm packages and third-party components in your applications. Use software composition analysis tools to scan and identify any compromised packages automatically. Prioritise completing this audit within the next week.
- Implement Software Bill of Materials (SBOM) Practices: Establish a formal process for tracking all software components, dependencies, and their versions across your organisation. An SBOM acts like an ingredients list for your software, making it much easier to identify and respond to supply chain compromises. This should become a standard part of your software development lifecycle.
- Use Package Verification and Integrity Checking: Configure your development tools to verify the integrity and authenticity of packages before they are installed. Use package lock files to ensure consistent versions are deployed, and implement checksum verification to detect tampering. Consider using private package registries that allow you to vet and approve packages before they are made available to your developers.
- Strengthen CI/CD Pipeline Security: Review and harden your automated build and deployment pipelines. Implement strict access controls, require code review for all changes, use separate credentials for different pipeline stages, and enable comprehensive logging and monitoring. Ensure that automated processes cannot be exploited to spread malicious code as happened in this incident.
- Monitor for Indicators of Compromise: Deploy security monitoring tools that can detect unusual behaviour in your applications, such as unexpected network connections, unauthorised data access, or suspicious process execution. Establish baseline behaviour for your applications so that anomalies can be quickly identified and investigated.
- Establish Vendor Security Requirements: When procuring software or services, require vendors to demonstrate their supply chain security practices. Ask about their software composition analysis processes, vulnerability management procedures, and incident response capabilities. Make supply chain security a key criterion in vendor selection decisions.
- Maintain Offline Backups: Ensure that critical systems and data are backed up regularly to offline or immutable storage that cannot be affected by supply chain compromises. Test your backup restoration procedures regularly to ensure you can recover quickly if systems are compromised.
London Council's Cyber Incident Disrupts Shared IT Systems
Why This Matters
This incident highlights several critical issues for public sector organisations, especially those using shared IT infrastructures. Shared services offer cost and efficiency benefits, but they also introduce concentration risk—allowing a single security event to affect multiple councils and significantly amplify disruption.
For UK local authorities, this attack reinforces that councils remain prime targets for cybercriminals. Holding sensitive resident data and providing essential services, local government bodies are particularly vulnerable to ransomware demands designed to disrupt vital operations.
Service interruptions from this incident have left residents unable to access important council functions, from tax payments to housing and social care support. For the most vulnerable, lost access poses serious consequences—highlighting that public sector cybersecurity is integral to service continuity and community wellbeing.
The situation also calls attention to the challenges many councils face in cybersecurity. Limited budgets and competition for skilled professionals leave public sector organisations exposed to threats that may be more easily managed in better-resourced environments.
Recommendations
To prevent similar incidents and strengthen resilience, public sector organisations and those operating shared IT infrastructure should take the following key actions:
- Assess Shared Services Risk: Evaluate how a cyber incident affecting shared IT systems could impact your organisation. Identify critical dependencies and potential cascading effects, and use these findings to update business continuity and disaster recovery plans.
- Enforce Network Segmentation: Use network segmentation, strict access controls, firewalls, and monitoring to prevent an attack on one part of the shared environment from spreading to others.
- Clarify Incident Response for Shared Infrastructure: Develop specific incident response procedures for shared IT environments, with clear roles and communication protocols between your organisation and service providers. Regularly test these procedures.
- Maintain Alternative Service Channels: Ensure essential services remain accessible during IT disruptions by providing alternative delivery methods, such as hotlines or in-person centres, and preparing staff to support these channels.
- Enhance Backup and Recovery: Regularly back up critical systems and data to secure, offline locations. Test recovery processes frequently and maintain an independent backup infrastructure wherever possible.
- Strengthen Access Controls: Require strong authentication, such as multi-factor authentication, especially for admin accounts. Regularly review access rights, remove unnecessary accounts, and monitor for unusual login activity.
- Invest in Cybersecurity Resources: Advocate for sufficient cybersecurity funding and, where possible, pool resources across councils to access specialist staff and advanced tools. Participate in information-sharing networks to stay informed of threats and share intelligence.
BT has launched an investigation after the Black Basta Ransomware Group Exposed 230,000+ Customer Records
Why This Matters
Recommendations
To prevent similar breaches and protect customer data, organisations should adopt the following measures:
- Strengthen Sensitive Data Protections: Identify all high-risk data—such as vulnerability registers, health and financial records—and apply robust controls: encrypt data at rest and in transit, enforce strict access restrictions, maintain comprehensive audit logs, and schedule regular security reviews. Minimise risk by retaining only essential sensitive data.
- Conduct Ongoing Security Assessments: Regularly engage independent cybersecurity experts for penetration testing, vulnerability scans, and security architecture reviews. Address identified issues promptly and treat these exercises as continuous processes, not one-off events.
- Enhance Database Security: Implement network segmentation to isolate databases, monitor database activity for unusual access, encrypt sensitive fields, and restrict data exports. Regularly update and protect database credentials.
- Monitor Criminal Marketplaces: Leverage threat intelligence to track potential data exposure on criminal forums and the dark web. Early detection enables swift customer protection and coordination with law enforcement. Consider dark web monitoring services for timely alerts.
- Establish and Test Breach Response: Maintain a comprehensive incident response plan covering detection, containment, investigation, notification, and recovery. Be prepared to meet UK GDPR’s 72-hour breach notification rule. Regularly rehearse response procedures to identify improvements.
- Prepare Customer Communication Plans: Draft clear communication strategies for notifying customers in the event of a breach, including what happened, affected data, and remedial steps. Provide support such as credit monitoring and dedicated helplines to help maintain trust.
- Review Third-Party Access: Audit all third-party providers with customer data access. Ensure contractual data protection requirements are enforced, that external access is limited to necessity, and routinely reassess permissions and compliance.
This week's threat report has highlighted significant cybersecurity incidents that demonstrate the diverse and evolving nature of cyber threats facing UK organisations.
Contact Periculo today to learn more about our Threat Intelligence services to help protect your organisation from cyber threats.
%20(1)%20(1).png?width=309&height=69&name=image-001%20(2)%20(1)%20(1).png)