Sunday, November 17, 2024
HomeAndroidMavenGate Supply Chain Attack Let Attackers Hijack Java & Android Apps

MavenGate Supply Chain Attack Let Attackers Hijack Java & Android Apps

Published on

Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the vendor, partner, or supplier network.

Threat actors can enter the target firm by distributing malware, influencing software upgrades, and gaining illicit access by breaching a reliable party in the supply chain.

Recently, cybersecurity researchers at Oversecured a supply chain attack, which is dubbed “MavenGate,” which let threat actors hijack Java and Android apps.

- Advertisement - SIEM as a Service
Document
Free Trial

Streaming Malware Service

Open Suspicious Files & Links in the ANY RUN Sandbox Safely; Try All Features for Free. Understand malware behavior, collect IOCs, and easily map malicious actions to TTPs — all in our interactive sandbox.

MavenGate Supply Chain Attack

Over 18% of dependencies are vulnerable, which could escalate the project risk. Exploiting allows code injection, build process risk, and infrastructure access. However, researchers reported more than 200 companies, including Google, Facebook, Signal, and Amazon.

Gradle projects have dependency repositories specifying where to find dependencies. 

Dependencies use groupId:artifactId: version format, and there are two repositories:-

  • Private (like Google)
  • Public (like mavenCentral())

Here, the security concern is how to prevent attackers from replacing public dependencies. To fix this, researchers advised doing identity confirmation via DNS TXT records for group ID registration by preventing substitution and ensuring safe usage of trusted dependencies.

Defense relies on adding DNS records, but abandoned projects pose a risk. The attack plan finds abandoned dependencies and then buys the domain. 

Developers often use one repository, which makes it vulnerable. While the attacker can claim rights via DNS TXT in a repository without account management. 

If the groupId is registered then the threat actors may contact support with a reason for access. Besides this, the procedures for transferring permissions can vary across repositories without a common standard.

Ethical concerns prevent testing on real dependencies. Besides this, for onboarding new projects, researchers focused on com.oversecured groupId by studying the processes in mavenCentral and jitpack repositories.

Mavencentral verified
Mavencentral verified (Source – Oversecured)

Types of Attacks 

Web and mobile app attacks:-

  • Attack on existing library versions: The attacker’s repository higher on the list replaces library copies with malicious code (Existing Defenses considered).
  • Attack on new versions: The attacker’s repository lower on the list releases a new version with embedded malicious code; many apps don’t check digital signatures.

Library Attacks:-

  • Make sure to check library groupId hijackability.
  • Library dependencies checked in the using project, transitive but searched based on the project’s repository declarations.

To gauge the issue of unsigned dependencies and missing public keys, experts suggest running ‘./gradlew –write-verification-metadata pgp,sha256 –export-keys.’ 

It reveals a high number of unsigned dependencies from Google. Apache dependencies lacked validation due to missing public keys. MavenCentral, which is a key repository, discloses statistics, while other repositories may not.

Vulnerability disclosures were sent to major companies, including Google, Facebook, Amazon, Microsoft, Adobe, LinkedIn, Netflix, and over 200 others.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...