HomeCyber BalkansReport: Open source package entry points susceptible to command jacking

Report: Open source package entry points susceptible to command jacking

Published on

spot_img

In a recent report, it has been highlighted how commonly used commands in various development environments can be targets for attackers seeking to exploit their reach. The report emphasizes the vulnerability of commands such as npm, pip, git, kubectl, terraform, gcloud, heroku, and dotnet, stating that they are attractive targets due to their widespread usage.

One of the tactics employed by attackers, as mentioned in the report, is known as “command jacking.” Instead of directly replacing a command, attackers create a wrapper around the original command, allowing them to maintain access for a longer period without detection. This approach also enables attackers to potentially extract sensitive information without raising suspicion. However, executing command jacking requires in-depth research by the attacker to identify the correct paths for the targeted commands on different systems and anticipate errors in their code, increasing complexity with the variety of systems targeted.

Another tactic highlighted in the report is the creation of malicious plugins for popular tools and frameworks. For instance, attackers could develop plugins for widely used frameworks like Python’s pytest testing framework. These plugins may appear to be utilities to assist in testing but, in reality, run malicious code in the background or enable flawed or vulnerable code to bypass quality checks. This method allows attackers to disguise their malicious intent within seemingly legitimate plugins, making detection more challenging.

Overall, the report underscores the significance of safeguarding against such malicious tactics in the development environment. Developers and IT professionals are advised to remain vigilant and take necessary precautions to protect against potential attacks on widely used commands and tools. Implementing robust security measures and regularly updating systems can help mitigate the risk of falling victim to malicious activities aimed at exploiting popular development commands and tools.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...