Bg Shape
Image

North Korean Supply Chain Attacks, Chrome Zero-Day Exploit, and Qilin EDR Bypass

Robert Kehoe
Chief Technology Officer
Published:
April 16, 2026

A few patterns are becoming hard to ignore this week. Supply chains are being quietly poisoned, core tools are turning into attack surfaces, and defensive controls are getting switched off like someone forgot to pay the electricity bill.

Same story, just sharper execution.

Supply Chain Attacks: North Korean Campaign

Over 1,700 libraries across NPM, PyPI, Go, and Rust have been compromised by North Korean state-backed actors. These aren’t obviously malicious packages either. They’re disguised as everyday developer tools like loggers, which makes them easy to miss and even easier to trust.

This campaign, known as Contagious Interview, is designed to extract SSH keys, cloud credentials, and crypto wallets directly from developer environments and CI/CD pipelines. So once it lands, it doesn’t just stay local. It spreads.

The uncomfortable part is how normal all of this looks on the surface.

What to do:
Start auditing your package dependencies properly, not just when something breaks. Enforce dependency pinning so versions don’t drift into something hostile. Block packages that attempt outbound communication post-install. If something “phones home” unexpectedly, assume it’s not doing it out of kindness.

Critical Vulnerability: Google Chrome Zero-Day

Another Chrome zero-day has been exploited in the wild. That makes four this year, which is not a statistic you frame and hang on the wall.

Attackers were already using it before it was publicly known, which means the usual delay between “patch available” and “patch applied” is doing real damage here.

Browsers are still treated like harmless tools when they’re effectively one of the most exposed pieces of infrastructure in any organisation.

What to do:
Unpatched browsers shouldn’t be allowed anywhere near the internet. Treat Chrome like critical infrastructure, because it is. Enforce auto-updates across your environment and actually verify compliance instead of assuming it’s working.

EDR Bypass: Qilin Ransomware

Qilin is back with something particularly useful for attackers and deeply inconvenient for everyone else. They’ve developed a driver-based technique that disables EDR solutions. Over 300 have reportedly been impacted.

Once that protection is gone, attackers can move freely while your monitoring tools sit there, blissfully unaware. If your entire detection strategy depends on EDR alone, this is where things fall apart.

What to do:
Enable tamper protection across all EDR deployments. Monitor for unusual driver loading activity, because that’s where this attack lives. If you have a SIEM, use it properly and review your DLL side-loading detection coverage. Defense shouldn’t collapse just because one control gets knocked out.

Read Our Latest Blogs

Blog Image
Palo Alto Firewall Exposure, Canvas LMS Breach, and Linux Kernel Privilege Escalation

Palo Alto firewall RCE, Canvas LMS data breach affecting 275 million users, and a nine-year Linux kernel privilege escalation bug.

Blog Image
LiteLLM Vulnerability, Scattered Spider Update, and the Vimeo Breach

This week: a critical LiteLLM AI gateway flaw exposes API keys, Scattered Spider faces legal action, and Vimeo's analytics breach highlights third-party risk.

Blog Image
Iran Cyber Activity Focuses on Industrial Systems and Data Leaks

Iran-linked cyber activity targets industrial systems, data leaks, and human vulnerabilities, with risk centred on access, exposure, and operational control

Bg ShapeBg Shape
BLOGS & INSIGHTS

North Korean Supply Chain Attacks, Chrome Zero-Day Exploit, and Qilin EDR Bypass

No items found.
Robert Kehoe
Chief Technology Officer
April 10, 2026

A few patterns are becoming hard to ignore this week. Supply chains are being quietly poisoned, core tools are turning into attack surfaces, and defensive controls are getting switched off like someone forgot to pay the electricity bill.

Same story, just sharper execution.

Supply Chain Attacks: North Korean Campaign

Over 1,700 libraries across NPM, PyPI, Go, and Rust have been compromised by North Korean state-backed actors. These aren’t obviously malicious packages either. They’re disguised as everyday developer tools like loggers, which makes them easy to miss and even easier to trust.

This campaign, known as Contagious Interview, is designed to extract SSH keys, cloud credentials, and crypto wallets directly from developer environments and CI/CD pipelines. So once it lands, it doesn’t just stay local. It spreads.

The uncomfortable part is how normal all of this looks on the surface.

What to do:
Start auditing your package dependencies properly, not just when something breaks. Enforce dependency pinning so versions don’t drift into something hostile. Block packages that attempt outbound communication post-install. If something “phones home” unexpectedly, assume it’s not doing it out of kindness.

Critical Vulnerability: Google Chrome Zero-Day

Another Chrome zero-day has been exploited in the wild. That makes four this year, which is not a statistic you frame and hang on the wall.

Attackers were already using it before it was publicly known, which means the usual delay between “patch available” and “patch applied” is doing real damage here.

Browsers are still treated like harmless tools when they’re effectively one of the most exposed pieces of infrastructure in any organisation.

What to do:
Unpatched browsers shouldn’t be allowed anywhere near the internet. Treat Chrome like critical infrastructure, because it is. Enforce auto-updates across your environment and actually verify compliance instead of assuming it’s working.

EDR Bypass: Qilin Ransomware

Qilin is back with something particularly useful for attackers and deeply inconvenient for everyone else. They’ve developed a driver-based technique that disables EDR solutions. Over 300 have reportedly been impacted.

Once that protection is gone, attackers can move freely while your monitoring tools sit there, blissfully unaware. If your entire detection strategy depends on EDR alone, this is where things fall apart.

What to do:
Enable tamper protection across all EDR deployments. Monitor for unusual driver loading activity, because that’s where this attack lives. If you have a SIEM, use it properly and review your DLL side-loading detection coverage. Defense shouldn’t collapse just because one control gets knocked out.

Robert Kehoe

Chief Technology Officer

Robert is CTO at Smarttech247, leading engineering strategy and delivery across cybersecurity products and services. With over 15 years’ experience in software and security, and CISSP certified, he has led large-scale cloud and security initiatives, including Cloud Protection for Salesforce. Robert focuses on measurable customer outcomes and building empowered, high-performing engineering teams.

Contents:

Emerging Threat Landscape

Attackers Are Bypassing the Controls You Rely On

Explore MDR Services

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365