Checkmarx

New Technique Detected in an Open Source Supply Chain Attack

Attackers create malicious GitHub repositories with popular names and topics, using techniques like automated updates and fake stars to boost search rankings and deceive users.

Supply Chain Attack Discovered Using Fake Python Infrastructure

The multi-stage and evasive malicious payload harvests passwords, credentials, and more dumps of valuable data from infected systems and exfiltrates them to the attacker’s infrastructure.

Users of Telegram, AWS, and Alibaba Cloud Targeted in Latest Supply Chain Attack

Attackers are using Starjacking and Typosquatting techniques to inject malicious code into open-source projects, compromising developers' systems and stealing sensitive data.

Attacker Deployed Hundreds of Rogue Python Packages with 75,000 Downloads to Steal Sensitive Data

The malicious packages aim to steal sensitive data from systems, applications, browsers, and users. They also target cryptocurrency users by redirecting transactions to the attacker's account.

Attacker Unleashes Stealthy Crypto Mining via Malicious Python Package

The Python package "Culturestreak" is a malicious software that hijacks system resources for unauthorized cryptocurrency mining. The package utilizes obfuscated code and random filenames to evade detection, making it a persistent threat.

New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk

A new vulnerability in GitHub's repository creation and username renaming operations could enable attackers to hijack popular repositories and distribute malicious code, posing a significant risk to the open-source community.

First Known Targeted OSS Supply Chain Attacks Against the Banking Sector

The attackers employed deceptive tactics such as creating fake LinkedIn profiles to appear credible and using customized command and control (C2) centers for each target, exploiting legitimate services for illicit activities.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags