Software packages with more than 2 billion weekly downloads hit in supply-chain attack

Date:

Share:



The email message Junon fell for came from an email address at support.npmjs.help, a domain created three days ago to mimic the official npmjs.com used by npm. It said Junon’s account would be closed unless he updated information related to his 2FA—which requires users to present a physical security key or supply a one-time passcode provided by an authenticator app in addition to a password when logging in.

According to an analysis from security firm Akido, the malicious code injects itself into the web browser of infected systems and begins monitoring for transfers involving ethereum, bitcoin, solana, tron, litecoin, and bitcoin cash currencies. When such transactions are detected, the infected packages would then replace the destination wallets with attacker-controlled addresses. The malware worked by hooking JavaScript functions, including fetch, XMLHttpRequest, and wallet APIs. Hooking gives code control over functions so they can be stopped or altered at certain execution points.

Word of the attack on the npm repositories came as two other supply-chain attacks took aim at other repositories that are influential in the open-source software ecosystem. One, disclosed Friday by security firm GitGuardians, compromised 3,325 authentication secrets for accounts on PyPI, npm, DockerHUB, GitHub, Cloudflare, and Amazon Web Servcies. In all, 327 GitHub users across 817 repositories were affected.

In the attack, compromised maintainer accounts pushed package updates that added malicious GitHub Actions workflows that extracted tokens and other sorts of authentication secrets. As of Friday, GitGuardian said, nine npm and 15 PyPI packages were at risk of compromise.

A separate supply-chain attack also hit users of GitHub last month, security firm Wiz reported last week. It targeted Nx, an open source build system and repository management tool used in enterprise settings. The initial compromise started after obtaining a valid authentication token to an npm account.

The malicious code extracted GitHub and npm tokens stored on compromised systems. It also abuses AI command-line interfaces to identify additional files that may be useful for accessing repositories of interest. A second phase of the attack used the compromised GitHub tokens to expose private repositories by making them public on the victims’ GitHub profiles. The pilfered credentials were uploaded to GitHub repositories that contained the name s1ngularity-repository, forming the basis for the name s1ngularity that Wiz has given to the incident.



Source link

━ more like this

January tax boom for HMRC – London Business News | Londonlovesbusiness.com

HMRC will celebrate a massive tax take in January, say leading audit, tax and business advisory firm, Blick Rothenberg. Robert Salter, a Director at...

Your AI could copy our worst instincts, but there’s a fix for AI social bias

Chatbots can sound neutral, but a new study suggests some models still pick sides in a familiar way. When prompted about social groups,...

RCEM warns lack of hospital beds is ‘not sustainable’ as norovirus surges – London Business News | Londonlovesbusiness.com

With hospital bed capacity is at its worst so far this winter, and the number of patients being hospitalised by certain seasonal illnesses on...

Nintendo’s latest product wants to cheer you up with random quips

Nintendo is back with another delightfully wacky product for your home. While not nearly as practical as Alarmo, the $100 alarm clock loaded...

Millions of motorists believe they can break these road laws in an emergency – London Business News | Londonlovesbusiness.com

More than 7 million UK motorists (17%) admit to breaking a road law in an emergency, with nearly a quarter (24%) confessing they...
spot_img