CyberSecurity news
@www.csoonline.com
//
References :
- CSO Online: Open source package entry points could be used for command jacking: Report
- checkmarx.com: This new supply chain attack technique can Trojanize all your CLI commands
- malware.news: This New Supply Chain Attack Technique Can Trojanize All Your CLI Commands
- www.scworld.com: Command-jacking used to launch malicious code on open-source platforms
- malware.news: Attackers hijack legitimate commands and run malicious code to launch supply chain attacks.
- infosec.exchange: Dependence on open-source repositories has sparked a surge in malicious packages infiltrating software products.
- securityonline.info: Security Online: Cybersecurity News and Research
- securityonline.info: “Command-Jacking”: New Supply Chain Attack Hijacks CLI Tools
Classification:
- HashTags: #SupplyChainAttack #OpenSourceSecurity #CommandJacking
- Target: Developers
- Product: Open Source Packages
- Feature: Entry Points
- Type: Vulnerability
- Severity: Major