Jeff Schulman 

138 Followers
616 Following
401 Posts
Ph.D Student (Informatics) & Adjunct Faculty at Penn State. Director, Netskope Government Services. Founder, Manteio Company. Systems Architect & Strategist. USMC Veteran. YIMBY.
We are!

'When developers remove their projects from the PyPI repository, the associated package names immediately become available for registration by any other user.

'Many CI/CD machines are already set up to install these packages automatically ...

'The pip install --upgrade command ... replaces the original package with our imposter package ...

'pip won’t show any warnings despite the fact that the package’s author has changed.

'Considered only [non-malicious/spam] packages that had more than 100K downloads OR were active for more than six months.

'... left with a list of more than 22K packagesthat are susceptible to “Revival Hijack”.

'On average, 309 packages are removed each month ...

'... 3 months later ... we have almost 200K downloads of these “safely hijacked” packages.

'... it would be very safe to say that code execution would occur in the vast majority of these cases.

'Almost immediately after the name became available, an account named Jinnis <[email protected]> published a package under the same name ...

'A few days later, on April 12, 2024, the new developer released an update containing the malicious payload promptly detected by our team.

'We fully advocate PyPI to adopt a stricter policy which completely disallows a package name from being reused. In addition, PyPI users need to be aware of this potential attack vector when considering upgrading to a new package version'.

This is a serious platform governance and an end-user software SCRM problem.
https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/

Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk

JFrog’s security research team continuously monitors open-source software registries, proactively identifying and addressing potential malware and vulnerability threats to foster a secure and reliable ecosystem for open-source software development and deployment. This blog details a PyPI supply chain attack technique the JFrog research team discovered had been recently exploited in the wild. This attack technique …

JFrog
1. curl is not made by me alone. I lead the project, we are over a *thousand* authors in total
2. I work full-time on providing curl support to paying customers. Some would call it a business.
3. Not "a" billion people. More like 6 billion or so; every human on the globe that is Internet-connected uses things that use curl - daily.
Did you know that #basicincome experiments have shown time and time again that given the choice, people don't choose idleness? They choose education. They choose entrepreneurship. They pursue culture and care. By guaranteeing survival, universal basic income enables truly living.
@imajeanpeace ahh sorry missed that
@imajeanpeace Have you tried Microsoft Authenticator?
Over the weekend, I wrote at Law Dork about the Trump legal questions facing SCOTUS specifically and the courts more broadly. There's a lot in it, so check it out and subscribe, but I want to highlight this section tonight: https://www.lawdork.com/p/trump-cases-courts-and-accountability
With Trump cases, the courts now must play their role in accountability

It is not anti-democratic to use the tools of our government to hold a person accountable for past anti-democratic actions.

Law Dork
I really have a heart for Uganda. Here's another effort to help make things better there: https://www.gofundme.com/f/each-day-we-have-a-choice
Each Day We Have a Choice...., organized by Lindsay Light

Hello Friends & Family! Meet my friends Biyinzika Yusuf & his beautiful wife Shilah K… Lindsay Light needs your support for Each Day We Have a Choice....

gofundme.com
TIL Microsoft makes a JSON and spreadsheet version of their threat actor naming conventions available. Pretty handy if you deal with multiple vendors' #ThreatIntel
mstic/PublicFeeds/ThreatActorNaming/MicrosoftMapping.json at master · microsoft/mstic

Microsoft Threat Intelligence. Contribute to microsoft/mstic development by creating an account on GitHub.

GitHub

https://cyberscoop.com/russia-hollywood-actors-zelensky/
Russian information operation uses US celebrity Cameos to attack Zelensky.
Kremlin propagandists tricked a half dozen celebrities into recording videos urging Ukraine's president to seek treatment for substance abuse.

🐦🔗: https://nitter.cz/IlvesToomas/status/1733935697600413784#m

[2023-12-10 19:44 UTC]

Russian information operation uses U.S. celebrity Cameos to attack Zelensky

Kremlin propagandists tricked a half dozen celebrities into recording videos urging Ukraine's president to seek treatment for substance abuse.

CyberScoop