• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Software Supply Chain Attack Hits Thousands of Apps

You are here: Home / General Cyber Security News / Software Supply Chain Attack Hits Thousands of Apps
July 6, 2022

Security researchers have discovered a important new application source chain attack affecting thousands of purposes and web sites involving the use of malicious npm packages.

ReversingLabs identified more than two dozen npm modules courting again six months. They contained obfuscated Javascript intended to steal variety data from the applications they have been deployed to.  

Attackers show up to have utilized typosquatting strategies to trick developers into downloading their malicious offers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


They impersonated significant-targeted visitors npm modules like “umbrellajs,” renamed “umbrellaks,” and deals released by ionic.io.

“Packages established by the npm ionic-io author … exhibit that the author posted 18 versions of an npm bundle named ‘icon-package’ containing the malicious variety thieving code,” ReversingLabs wrote.

“That was a glaring endeavor to mislead builders into making use of this deal alternatively of ‘ionicons,’ a well-known, open source icon established with a lot more than 1,000 icons for web, iOS, Android, and desktop applications.”

All the deals were developed to obtain type info using jQuery Ajax capabilities and then exfiltrate that facts to domains managed by the menace actors.

The whole extent of the campaign has but to be discovered, but it now highlights systemic worries going through builders who use open up supply elements to accelerate time-to-market place.

“It is apparent that software program progress companies as effectively as their consumers need new instruments and processes for examining offer chain threats like the ones posed by these malicious npm packages. The decentralized and modular mother nature of application progress indicates that programs and services are only as powerful as their least safe element,” argued ReversingLabs.

“The accomplishment of this attack – with far more than two dozen malicious modules obtainable for download on a popular package deal repository, and one particular of them with 17,000 downloads in a issue of months – underscores the freewheeling character of software improvement, and the very low boundaries to malicious or even susceptible code entering sensitive purposes and IT environments.”


Some components of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News NCSC: Prepare for Protected Period of Heightened Cyber Risk
Next Post: Russia-linked state-sponsored hackers launch fresh attacks by abusing latest red team tool russia linked state sponsored hackers launch fresh attacks by abusing latest red»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies
  • Update Chrome Now: Google Releases Patch for Actively Exploited Zero-Day Vulnerability

Copyright © TheCyberSecurity.News, All Rights Reserved.