GitLab discovers widespread npm supply chain attack (about.gitlab.com)
from cm0002@lemmy.cafe to cybersecurity@infosec.pub on 11 Dec 01:18
https://lemmy.cafe/post/28234843

#cybersecurity

threaded - newest

ThatGuyNamedZeus@feddit.org on 11 Dec 01:23 next collapse

Cool! Now consider all the others they haven’t found yet

Skullgrid@lemmy.world on 11 Dec 03:45 collapse

the ones that scare me are apt and pacman and the others

redsand@lemmy.dbzer0.com on 11 Dec 06:39 collapse

Those aren’t insane to audit. It’s the libraries everyone uses

tal@lemmy.today on 11 Dec 05:16 next collapse

The malware continuously monitors its access to GitHub (for exfiltration) and npm (for propagation). If an infected system loses access to both channels simultaneously, it triggers immediate data destruction on the compromised machine. On Windows, it attempts to delete all user files and overwrite disk sectors. On Unix systems, it uses shred to overwrite files before deletion, making recovery nearly impossible.

shred is intended to overwrite the actual on-disk contents by overwriting data in the file prior to unlinking the files. However, shred isn’t as effective on journalled filesystems, because writing in this fashion doesn’t overwrite the contents on-disk like this. Normally, ext3, ext4, and btrfs are journalled. Most people are not running ext2 in 2025, save maybe on their /boot partition, if they have that as a separate partition.

Spellbind0127@infosec.pub on 11 Dec 18:49 next collapse

this is an insane attack

Lightfire228@pawb.social on 11 Dec 19:01 collapse

Is this different from Shai Hulud 2?

Edit: the article was published November 24, so I’m pretty sure this is just Shai Hulud 2