SC Staff@scmagazine.com
//
The Lazarus Group, a North Korean APT, is actively targeting developers through the npm ecosystem by publishing malicious packages. These packages are designed to compromise developer environments, steal credentials, extract cryptocurrency data, and deploy backdoors. The attackers use typosquatting, mimicking legitimate library names to deceive developers into downloading the compromised versions. The packages contain BeaverTail malware and the InvisibleFerret backdoor and exhibit identical obfuscation techniques, cross-platform targeting, and command-and-control mechanisms consistent with previous Lazarus campaigns.
Six malicious npm packages have been identified, including postcss-optimizer, is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, and react-event-dependency. These packages have been collectively downloaded over 330 times and contain the BeaverTail malware, which functions as both an infostealer and a loader designed to steal login credentials, exfiltrate sensitive data, and deploy backdoors in compromised systems. The Lazarus Group also maintained GitHub repositories for five of the malicious packages, lending an appearance of open source legitimacy. Recommended read:
References :
Jeff Burt@DevOps.com
//
A malicious package imitating the popular BoltDB module has been discovered in the Go ecosystem. This package contains a backdoor that enables remote code execution, posing a significant security risk to developers using the compromised module. The malicious package, a typosquat of BoltDB, was discovered by researchers at Socket, an application security company.
This attack exploits the Go Module Mirror's caching mechanism, allowing the malware to persist undetected despite manual code reviews. After the malware was cached by the Go Module Mirror, the git tag was strategically altered on GitHub to remove traces of malicious code and hide it from manual review. To mitigate software supply-chain threats, Socket advises developers to verify package integrity before installation, analyze dependencies for anomalies, and use security tools that inspect installed code at a deeper level. Recommended read:
References :
Kirsten Doyle@Information Security Buzz
//
Socket researchers have discovered a malicious campaign infiltrating the Go ecosystem using typosquatted packages. These packages are designed to install hidden loader malware targeting Linux and macOS systems. The threat actor has published at least seven packages that impersonate widely used Go libraries.
These malicious packages share repeated malicious filenames and consistent obfuscation techniques, suggesting a coordinated threat actor. One of the packages appears to target financial-sector developers. The typosquatted packages can execute remote code, potentially stealing data or credentials. Recommended read:
References :
@github.com
//
References:
checkmarx.com
, malware.news
,
A significant issue has arisen within the NPM ecosystem due to confusion between two similar commands: `npm add user` and `npm adduser`. The command `npm add user`, intended as an alias for `npm install`, has inadvertently led a large number of developers to install a package named 'user'. This error stems from the similarity in commands and the chance of a developer hitting a whitespace when quickly typing 'npm adduser', which is used to create a user in the registry. This oversight, which was pointed out in a Pull Request but ignored, underscores a concerning supply chain vulnerability that could be exploited.
This innocent looking ‘user’ package, currently a simple hello-world application, has been downloaded nearly 12 million times. The concern is that the benign package could be updated in the future to include malicious code. NPM reports 2760 dependent packages, with at least 20 added in December 2024 alone, indicating the widespread nature of this mistake. This means that a future update to the ‘user’ package would pose a risk to the thousands of developers who have inadvertently installed it and any packages that depend on it, turning a simple typo into a potential security nightmare. Recommended read:
References :
|