
'When developers remove their projects from the PyPI repository, the associated package names immediately become available for registration by any other user.
'Many CI/CD machines are already set up to install these packages automatically ...
'The pip install --upgrade command ... replaces the original package with our imposter package ...
'pip won’t show any warnings despite the fact that the package’s author has changed.
'Considered only [non-malicious/spam] packages that had more than 100K downloads OR were active for more than six months.
'... left with a list of more than 22K packagesthat are susceptible to “Revival Hijack”.
'On average, 309 packages are removed each month ...
'... 3 months later ... we have almost 200K downloads of these “safely hijacked” packages.
'... it would be very safe to say that code execution would occur in the vast majority of these cases.
'Almost immediately after the name became available, an account named Jinnis <[email protected]> published a package under the same name ...
'A few days later, on April 12, 2024, the new developer released an update containing the malicious payload promptly detected by our team.
'We fully advocate PyPI to adopt a stricter policy which completely disallows a package name from being reused. In addition, PyPI users need to be aware of this potential attack vector when considering upgrading to a new package version'.
This is a serious platform governance and an end-user software SCRM problem.
https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/
JFrog’s security research team continuously monitors open-source software registries, proactively identifying and addressing potential malware and vulnerability threats to foster a secure and reliable ecosystem for open-source software development and deployment. This blog details a PyPI supply chain attack technique the JFrog research team discovered had been recently exploited in the wild. This attack technique …
https://cyberscoop.com/russia-hollywood-actors-zelensky/
Russian information operation uses US celebrity Cameos to attack Zelensky.
Kremlin propagandists tricked a half dozen celebrities into recording videos urging Ukraine's president to seek treatment for substance abuse.
🐦🔗: https://nitter.cz/IlvesToomas/status/1733935697600413784#m
[2023-12-10 19:44 UTC]