112 Followers
4 Following
47 Posts

Phylum automatically detects and blocks software supply chain attacks originating from open-source package registries: npm, PyPI, Rubygems, Crates.io, Nuget, Maven and Go.

Follow for research on supply chain attacks, malicious packages, and security shenanigans.

Websitehttps://phylum.io
Githubhttps://github.com/phylum-dev
Twitterhttps://twitter.com/Phylum_IO
Linkedinhttps://www.linkedin.com/company/phylum-io/
Fake Puppeteer Packages Contain Malware

In ongoing supply chain attack on npm.

Phylum Research | Software Supply Chain Security

Have you ever had your private #crypto keys stolen? #Malware authors have published forks of the popular Ethers library that exfiltrate private keys and give attackers #SSH access to infected machines.

https://blog.phylum.io/trojanized-ethers-forks-on-npm-attempting-to-steal-ethereum-private-keys/

#npm #javascript #security #opensource #nodejs #infosec #typescript #ethereum #cryptocurrency #crypto

Trojanized Ethers Forks on npm Attempting to Steal Ethereum Private Keys | Phylum

Software supply chain attack targets open-source developers in npm via malicious packages that steal Ethereum private keys, gain SSH persistence.

Phylum Research | Software Supply Chain Security
North Korea Still Attacking Developers via npm | Phylum

There's a renewed surge of attacks with obfuscated JavaScript and fake job campaigns to compromise developers and infiltrate companies. See Phylum research.

Phylum Research | Software Supply Chain Security

In the last 6 months, roughly 70% of new #npm packages were #spam. What does this mean for supply chain security?

At Black Hat USA? Find us in Startup City booth SC203!

#npmjs #node #javascript #typescript #infosec #opensource

https://blog.phylum.io/the-great-npm-garbage-patch

The Great npm Garbage Patch | Phylum

Open-source spam is a growing threat. The Tea protocol and npm are taking action, but the problem persists. Our research is dedicated to combating this issue and protecting the integrity of the open-source ecosystem. See Phylum Research.

Phylum Research | Software Supply Chain Security

Our sponsors are the bee's knees! 🐝 Their support allows us to continue providing fun, alcohol-free events at security conferences, like the Sober Speakeasy on August 8th.

♦ Platinum: @intezerlabs
♦ Gold: @phylum, Write Alchemist, EmberOT
♦ Silver: Anetac, @infosystir, @DianaInitiative, Mind Over Cyber

Join us at the Mob Museum on August 8th between @blackhatevents & @defcon

Register at https://www.soberincyber.org/events-1/sober-speakeasy-2024

Sober Speakeasy 2024 | Sober in Cyber

A Sober Speakeasy event at the Mob Museum during Black Hat / DEF CON 2024!

Sober in Cyber

Backdoor sneaked into fake AWS package was downloaded hundreds of times

Files available on the open source NPM repository underscore a growing sophistication.

https://arstechnica.com/security/2024/07/code-sneaked-into-fake-aws-downloaded-hundreds-of-times-backdoored-dev-devices/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

Here’s how carefully concealed backdoor in fake AWS files escaped mainstream notice

Files available on the open source NPM repository underscore a growing sophistication.

Ars Technica
Fake AWS Packages Ship Command and Control Malware In JPEG Files

On July 13, 2024, the Phylum platform alerted us to a series of odd packages published to the npm package registry. At first glance, these packages appear entirely legitimate; however, as our system automatically noted, they contained sophisticated command and control functionality hidden in image files that would be executed

Phylum

Advanced threat actors have not let up on their attacks against the software supply chain. We catalog recent attacks from North Korean state actors in our new blog post!

#npm #javascript #typescript #malware #cybersecurity #npmjs

https://blog.phylum.io/new-tactics-from-a-familiar-threat/

New Tactics from a Familiar Threat

For over a year, Phylum has been exposing North Korean threat actors attacking software developers in the open-source supply chain. This blog post highlights evolving tactics from a North Korean campaign that began in September 2023 with a package published on 4 July 2024 in npm. Like a snake shedding

Phylum

Supply chain attacks come in all shapes and sizes. Today Phylum Research discusses its discovery of malicious #jQuery files in #npm.

https://blog.phylum.io/persistent-npm-campaign-shipping-trojanized-jquery/

#javascript #opensource #sbom #js #npmjs #node #cybersecurity #softwaredevelopment #software

Persistent npm Campaign Shipping Trojanized jQuery

Since May 26, 2024, Phylum has been monitoring a persistent supply chain attacker involving a trojanized version of jQuery. We initially discovered the malicious variant on npm, where we saw the compromised version published in dozens of packages over a month. After investigating, we found instances of the trojanized jQuery

Phylum

#OpenSource libs routinely use polyfill.io. Just bc you arent using the compromised #CDN directly, one of your deps might be. We put together a list of recently released pkgs that ref polyfill.io!

#polyfill #polyfillio #malware

https://blog.phylum.io/a-note-about-polyfill

A Note About Polyfill

Background On July 25, 2024, Sansec issued an alert to developers regarding a serious supply-chain security incident. The CDN on the polyfill[.]io domain was found to be serving malware in a highly sophisticated manner designed to evade detection. The issue traces back to February 2024, when a Chinese company

Phylum