Posts by cyberlibrarian@infosec.exchange
 (DIR) Post #AVsusvvyi2lMxKTz0K by cyberlibrarian@infosec.exchange
       2023-05-21T15:57:07Z
       
       1 likes, 4 repeats
       
       This weekend PyPi, the python software repository, suspended new accounts: the level of malicious activity has become unmanageable.But this story is not just about Python: the level of risk from software dependencies has risen unimaginably: not a little, not a lot, this is big enough that it is hard to communicate and comprehend.Python (pypi), Javascript (npm), Java (maven), Ruby, and even VS Code extensions are all under constant unrelenting attack. When a single package is trojanized, that threat is inherited by every application that include the compromised package.The number of methods being used for these attacks is growing, and developers are now a "target of choice" for many criminal groups.For example, in 2022 there was a sudden increase in the number of an effectiveness of "Phishing as a Service" (PhaaS) offerings in criminal markets. These services are effective at bypassing MFA. However, you may not know that these services are being used to target developer accounts, including repositories of private and open-source software. They want to trojanize the code and create the next big software-supply-chain compromise.PhaaS is just one method. This weekend's announcement from PyPi was the result of criminals creating a large number of developer accounts so that they can publish malicious clones of existing packages. Typosquatting of packages is not a new phenomena, the constant stream of attacks is new.You might assume that the repository hosts or managers must have a solution. They do not. The problems are diverse and many: from the management of repository hosting, to the security/trust verification features of packaging systems, to the security of repositories and the developers themselves.There is no one solution, but solutions are needed.My action item for you is this. Do not read cybesecurity about software repository compromises in isolation. Look at the forest and not the trees. Big risks are harder to understand that little ones but need the most urgent action.Below are a small selection of stories in the comments to get you started. This is just a tiny fraction of the stories I have read and analyzed in the past year. The "hits just keep on coming".#SoftwareDeveloper #GitHub #PyPi #NPM #Java #Python #CyberSecurity #PhishingAsAService #ThreatIntelligence #CTI #PhaaS #TypoSquatting #VSCode #Malware #SoftwareSupplyChain https://www.bleepingcomputer.com/news/security/pypi-temporarily-pauses-new-users-projects-amid-high-volume-of-malware/https://www.zdnet.com/article/security-warning-for-software-developers-you-are-now-prime-targets-for-phishing-attacks/https://blog.checkpoint.com/securing-the-cloud/malicious-vscode-extensions-with-more-than-45k-downloads-steal-pii-and-enable-backdoors/https://therecord.media/malware-found-in-npm-package-with-millions-of-weekly-downloadshttps://blog.phylum.io/a-pypi-typosquatting-campaign-post-mortem/https://www.zdnet.com/article/android-warning-these-malicious-apps-had-over-a-million-downloads-from-google-play/https://www.bleepingcomputer.com/news/security/malicious-microsoft-vscode-extensions-steal-passwords-open-remote-shells/https://www.bleepingcomputer.com/news/microsoft/vscode-marketplace-can-be-abused-to-host-malicious-extensions/
       
 (DIR) Post #AXEiiTDmtlNjQuE0MS by cyberlibrarian@infosec.exchange
       2023-07-01T02:27:56Z
       
       0 likes, 0 repeats
       
       @textfiles Wow, this is the 1st time I have seen anything that gives the Taylor Family Digital Library’s gaming collection a run for its money.
       
 (DIR) Post #Aa0EPRgmfJnmNcydHc by cyberlibrarian@infosec.exchange
       2023-09-21T20:18:35Z
       
       0 likes, 1 repeats
       
       @jerry Do it!! Threat Actor themed tacos.  CISO Jerry “Taco” Bell.