Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » OpenJS Foundation targets potential acquisition of JavaScript project
    Cyber Security

    OpenJS Foundation targets potential acquisition of JavaScript project

    techempireBy techempire2 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 16, 2024Editorial DepartmentSupply Chain/Software Security

    JavaScript project

    Security researchers have discovered a “trusted” takeover attempt against the OpenJS Foundation in a manner similar to the recently discovered incident against the open source XZ Utils project.

    The OpenJS Foundation and the Open Source Security Foundation (OpenSSF) said in a joint alert: “The OpenJS Foundation Cross-Ad hoc Committee has received a series of suspicious emails containing similar messages, different names, and overlap with GitHub-related emails. .

    OpenJS Foundation executive director Robin Bender Ginn and OpenSSF general manager Omkhar Arasaratnam said the emails urged OpenJS to take action to update one of its popular JavaScript projects to fix critical vulnerabilities, but did not provide any specific details.

    Internet security

    The email authors also called on OpenJS to designate them as new maintainers of the project, despite their previous minimal involvement. Two other popular JavaScript projects not hosted by OpenJS are said to be involved in similar activities.

    That is, no one contacting OpenJS has been granted access to the OpenJS hosting project.

    The incident shines a spotlight on the methods by which XZ Utils’ sole maintainer was targeted by fictional characters specifically created as a social engineering and pressure campaign designed to make Jiatan, aka JiaT75, a co-attacker.

    The two open source organizations said this suggests that the attempt to compromise XZ Utils may not be an isolated incident, but part of a broader campaign to compromise the security of individual projects. The name of the JavaScript project has not been made public.

    As it stands, Jia Tan has no other digital footprint beyond his contributions, suggesting that the account’s sole purpose was to gain credibility with the open source development community over the years and ultimately push a secret backdoor into XZ Utils.

    It also looks at open source, volunteer-run projects used in many Linux distributions to find out the complexity and patience behind planning and execution of activities that put organizations and users at risk of supply chain attacks.

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said last week that the XZ Utils backdoor incident also highlighted the “fragility” of the open source ecosystem and the risks posed by maintainer burnout.

    “The security burden should not fall on a single open source maintainer, and in this case it had near-catastrophic consequences,” said CISA officers Jack Cable and Aeva Black.

    Internet security

    “Every technology manufacturer that profits from open source software must do their part to be a responsible consumer and sustainable contributor of the open source software packages they rely on.”

    The agency recommends that technology manufacturers and system operators that use open source components should directly or support maintainers to regularly review source code, eliminate entire classes of vulnerabilities, and implement other security design principles.

    “These social engineering attacks are exploiting maintainers’ sense of responsibility to their projects and communities to manipulate them,” Bender Ginn and Arasaratnam said.

    “Pay attention to how the interaction makes you feel. Interactions that create feelings of self-doubt, inadequacy, not doing enough for the project, etc. may be part of a social engineering attack.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.