• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
packagist repository hacked: over a dozen php packages with 500

Packagist Repository Hacked: Over a Dozen PHP Packages with 500 Million Compromised

You are here: Home / General Cyber Security News / Packagist Repository Hacked: Over a Dozen PHP Packages with 500 Million Compromised
May 5, 2023

PHP software deal repository Packagist revealed that an “attacker” gained entry to 4 inactive accounts on the platform to hijack about a dozen offers with over 500 million installs to date.

“The attacker forked each and every of the deals and changed the package description in composer.json with their possess message but did not usually make any destructive improvements,” Packagist’s Nils Adermann reported. “The package URLs were being then altered to place to the forked repositories.”

The 4 consumer accounts are explained to have had entry to a overall of 14 packages, like several Doctrine packages. The incident took spot on May 1, 2023. The comprehensive listing of impacted packages is as follows –

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


  • acmephp/acmephp
  • acmephp/main
  • acmephp/ssl
  • doctrine/doctrine-cache-bundle
  • doctrine/doctrine-module
  • doctrine/doctrine-mongo-odm-module
  • doctrine/doctrine-orm-module
  • doctrine/instantiator
  • growthbook/growthbook
  • jdorn/file-method-cache
  • jdorn/sql-formatter
  • khanamiryan/qrcode-detector-decoder
  • item-calisthenics/phpcs-calisthenics-rules
  • tga/simhash-php

Security researcher Ax Sharma, composing for Bleeping Pc, uncovered that the variations were made by an nameless penetration tester with the pseudonym “neskafe3v1” in an try to land a job.

Cybersecurity

The attack chain, in a nutshell, built it doable to modify the Packagist page for each of these deals to a namesake GitHub repository, efficiently altering the set up workflow utilised in just Composer environments.

Profitable exploitation intended that developers downloading the deals would get the forked variation as opposed to the actual contents.

Packagist claimed that no supplemental destructive variations have been dispersed, and that all the accounts had been disabled and their offers restored on May 2, 2023. It really is also urging end users to allow two-factor authentication (2FA) to protected their accounts.

“All 4 accounts look to have been using shared passwords leaked in preceding incidents on other platforms,” Adermann famous. “Remember to, do not reuse passwords.”

The growth arrives as cloud security company Aqua identified 1000’s of exposed cloud application registries and repositories containing more than 250 million artifacts and about 65,000 container visuals.

The misconfigurations stem from mistakenly connecting registries to the internet, making it possible for nameless accessibility by layout, applying default passwords, and granting upload privileges to people that could be abused to poison the registry with destructive code.

“In some of these circumstances, anonymous consumer accessibility allowed a potential attacker to attain sensitive details, these kinds of as tricks, keys, and passwords, which could lead to a significant application source chain attack and poisoning of the software enhancement existence cycle (SDLC),” researchers Mor Weinberger and Assaf Morag disclosed late previous month.

Found this article exciting? Comply with us on Twitter  and LinkedIn to examine much more exceptional articles we article.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Cyber Patrols Lead to Seizure of Stolen Artefacts
Next Post: Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts lack of visibility: the challenge of protecting websites from third party»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.