A serious supply chain attack named "Shai-Halud" impacted over 477 JavaScript packages under the NPM (Node Package Manager) system, targeting essentially tools associated with CrowdStrike, in particular. Hackers infiltrated authorized publisher accounts and introduced malicious code in widely used packages such as @crowdstrike/commitlint, @crowdstrike/falcon-shoelace, and @crowdstrike/foundry-js. Such manipulated packages, after getting installed, executed scripts to capture environment variables, authentication tokens, and configs, particularly from development pipelines and CI/CD tools. Such an incident demonstrates the susceptibility of open-source registries toward multi-faceted and large-scale attacks. The apparent motivation here is unauthorized entry into sensitive enterprise environments. By taking advantage of poor security practices, including poor account security and absence of monitoring, the attackers were able to mechanize injection of malicious code into commonly used corporate infrastructure packages. These packages were probably chosen due to their integration into enterprise security tools, and thus, the most natural vectors for gaining entry into inner networks and valuable information. Widespread use of NPM dependencies serves only to increase the danger, since a single compromised package may impact a large number of downstream applications and services. Following this attack, developers and organizations need to immediately verify their NPM dependencies, particularly the ones that interact with CrowdStrike. They will need to delete any tainted packages and update any exposed credentials. Against future compromises, multi-factor authentication on publisher accounts needs to be utilized, and there needs to be vigilance on code integrity, and automated tools need to be used in order to identify suspicious activities. Supply chain security needs to be enhanced very significantly for every software development practice utilizing open-source components.
Researchers at Cofense Intelligence found the campaign of group Lone None distributing advanced malware in the form of spoofed copyright takedown notices. The campaign delivers the...
A widespread security issue has been uncovered in mobile apps using Firebase, where misconfigured services expose sensitive user data to unauthenticated attackers. First disclosed ...
A new phishing campaign is targeting PyPI maintainers using deceptive emails that mimic official PyPI communications. These emails, crafted to look like account verification reques...