12/15/23: Malware, crypto wallet hack, North Korea & more.
Here are this week's security highlights:
Malware packages found on PyPI repository
A set of 116 malicious packages on the Python Package Index (PyPI) repository are designed to infect Windows and Linux systems with a custom backdoor.
"In some cases, the final payload is a variant of the infamous W4SP Stealer, or a simple clipboard monitor to steal cryptocurrency, or both," ESET researchers Marc-Etienne M.Léveillé and Rene H. said in the report.
The packages are estimated to have been downloaded over 10,000 times since May 2023.
NSA releases recommendations to mitigate software supply chain risk
The National Security Agency (NSA) is releasing the Cybersecurity Information Sheet (CSI), “Recommendations for Software Bill of Materials (SBOM) Management.”
This CSI provides network owners and operators with guidance for incorporating SBOM use to help protect the cybersecurity supply chain, with a focus on and some additional guidance for National Security Systems (NSS). Effective Software Bill of Materials (SBOM) management leverages identification of software components to mitigate cyber risk and support improved cybersecurity throughout the software’s lifecycle.
Ledger dApp supply chain attack steals $600K from crypto wallets
Ledger is warning users not to use web3 dApps after a supply chain attack on the 'Ledger dApp Connect Kit' library was found pushing a JavaScript wallet drainer that stole $600,000 in crypto and NFTs.
Ledger is a hardware wallet that lets users buy, manage, and securely store their digital assets offline, supporting multiple cryptocurrencies, including Bitcoin and Ethereum.
Recommended by LinkedIn
The company offers a library called the "Ledger dApps Connect Kit" that allows web3 apps to connect to Ledger hardware wallets.
Global TeamCity exploitation opens door to another SolarWinds?
APT29, the notorious Russian advanced persistent threat behind the 2020 SolarWinds hack, is actively exploiting a critical security vulnerability in JetBrains TeamCity that could open the door to rampant software supply chain attacks.
That's the word from CISA, the FBI, the NSA, and a host of international partners, who said in a joint alert today that APT29 (aka CozyBear, the Dukes, Midnight Blizzard, or Nobelium) is hammering servers hosting TeamCity software "at a large scale" using the unauthenticated remote code execution (RCE) bug.
North Korean hacking ops continue to exploit Log4Shell
Two years after the Log4j vulnerability was revealed, North Korean hackers are continuing to use the flaw in a ubiquitous piece of open source software to carry out attacks as part of a hacking campaign targeting manufacturing, agricultural and physical security entities, according to research released Monday.
Carried out over the course of 2023 and described in a report released by Cisco’s Talos Intelligence Group on Monday, the campaign employed at least three new malware families and relied, in part, on the Log4Shell exploit, highlighting the long tail of the Log4j vulnerability and how failure to patch the flaw is providing a ready tool to malicious hackers.
RSVP to watch Dan Lorenc patch a CVE on a LinkedIn stream: 12/20 @ 12pm.
Subscribe for more weekly security updates!
Software Engineer | Builder | Passionate about AI enabled software development, cloud-native solutions, and automation.
1yThoroughly enjoyed the infographic / montage
Linux *Ops
1yWith all this repo jacking and sbom stuff, I’d be kinda upset if I cared about jfrog’s stock.
Unix. DevOps. Nomad.
1yYou are such nerds 😁