Saturday, June 15, 2024

Nascent Malware Attacking npm, PyPI, and RubyGems Developers

Phylum analyzes source code and metadata for all registry-pushed packages. This year, in millions of packages they are aiming to examine nearly a billion files, as this will enable them to get unique insights into package behaviors across ecosystems.

That’s why it has been actively tracking various recent malware campaigns, from fake npm package updates to GCC binary impostors and complex data exfiltration setups.

Besides this, the cybersecurity analysts at Phylum recently reported about Nascent malware attacking developers of the following platforms and programs:-

Nascent Malware on Registry packages

Phylum’s automated platform alerted researchers about the “kwxiaodian” package on September 3, 2023, and in its setup.py the following contents were revealed:-

Contents of setup.py (Source – Phylum)

Simultaneously, they received alerts about harmful npm packages executing specific actions in the package.json preinstall hook, and then the obfuscated index.js file was executed.

Here below, we have mentioned all the things that this package does:-

  • The network interface info is gathered initially.
  • Basic information like OS details, free memory available, etc., were also collected.
  • If the platform is not macOS, then the execution is automatically terminated.
  • Lastly, it encrypts and sends data to the attacker’s server.

The Rubygems package mirrors PyPI and npm patterns, triggering automatic execution via the “Rakefile” to collect and send host information to a remote server.

Ruby platform data collection (Source – Phylum)

Ecosystems Commonalities 

However, apart from all these things, the campaigns targeting npm, PyPI, and RubyGems are identical, as revealed by the researchers upon close review analysis.

Here below, we have mentioned all the commonalities:-

  • On 81.70.191.194, all the packages communicate with a service.
  • Collects and sends system info to this service.
  • On macOS systems, the packages execute only.
  • Similar versions across ecosystems were published.

Timeline

Full package timeline (Source – Phylum)

Malware is widespread in open-source registries, and despite security awareness, developers often pull and execute packages from unknown sources. Making manual audits impractical due to the increasing number of dependencies.

In this scenario, using automated solutions to detect and block packages violating defined policies is a wise approach to managing malware and other risks.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles