Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Malicious NPM package steals hundreds of developer SSH keys via GitHub
    Cyber Security

    Malicious NPM package steals hundreds of developer SSH keys via GitHub

    techempireBy techempireNo Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 23, 2024Editorial DepartmentSoftware Security/Supply Chain

    Malicious NPM suite

    Two malicious packages discovered in the npm package registry leverage GitHub to store Base64-encrypted SSH keys stolen from the systems of developers who installed them.

    Mods named warbeast2000 and kodiak2k were released earlier this month and attracted 412 and 1,281 downloads respectively before being removed by npm maintainers. The most recent download occurred on January 21, 2024.

    ReversingLabs, the software supply chain security company that discovered the issue, said there are eight different versions of warbeast2000 and more than 30 versions of kodiak2k.

    Both mods are designed to run a post-install script upon installation, which is designed to retrieve and execute two different JavaScript archives.

    Internet security

    When warbeast2000 attempts to access a private SSH key, kodiak2k aims to look for a key named “meow”, which increases the possibility that threat actors are using placeholder names in the early stages of development.

    Security researcher Lucija Valentić said: “The second stage of the malicious script reads The SSH private key stored in the id_rsa file in the /.ssh directory. “It then uploads the Base64-encoded key to an attacker-controlled GitHub repository. “

    Later versions of kodiak2k were found to execute scripts found in the archived GitHub project hosting the Empire post-development framework. This script launches the Mimikatz hacking tool and dumps credentials from process memory.

    “This campaign is just the latest example of cybercriminals and malicious actors leveraging open source kit managers and related infrastructure to support malware supply chain campaigns targeting development and end-user organizations,” Valentić said.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.