HomeCII/OTRising Threat of Supply Chain Attack Could Lead to Massive PyPI Takeovers

Rising Threat of Supply Chain Attack Could Lead to Massive PyPI Takeovers

Published on

spot_img

In an alarming discovery, cybersecurity researchers at JFrog have brought to light a new supply chain attack technique that puts over 22,000 software packages on the Python Package Index (PyPI) at risk. This technique, named “Revival Hijack,” exploits a policy loophole that allows attackers to re-register and take over package names once they have been removed from PyPI by the original developers.

Unlike traditional typosquatting attacks that rely on users misspelling package names, Revival Hijack takes advantage of popular packages being removed and then re-registered by attackers. This allows these malicious actors to upload harmful versions of the packages, which unsuspecting users may download and install, thinking they are legitimate.

JFrog’s technical analysis uncovered that more than 22,000 PyPI packages were vulnerable to the Revival Hijack attack, posing a serious threat to hundreds of thousands of users who could unknowingly download harmful software.

To demonstrate the effectiveness of the Revival Hijack attack, JFrog conducted a controlled experiment. They created and published a package, removed it, and then re-registered it under a different user. This experiment illustrated how the new, imposter package appeared as a legitimate update without any warnings from the package manager.

In a real-world scenario on April 12, 2024, JFrog’s systems detected suspicious activity related to the ‘pingdomv3’ package, which had been taken over by a new owner. This new owner released an innocuous update followed by a version containing a suspicious, Base64-obfuscated payload. Immediate action was taken, and the malicious package was removed by PyPI maintainers.

The proactive measures employed by JFrog’s research team successfully prevented significant damage from occurring. However, despite these protective measures, thousands of downloads of the reserved packages within a short period indicated a high risk of supply chain attacks.

Security researcher Henrik Plate from Endor Labs emphasized that the risk posed by Revival Hijack depends on the popularity of the package and highlighted the importance of stringent security guidelines for package registries. He recommended using internal package registries that mirror open-source packages and require a vetting process for new versions of revived packages to mitigate the inclusion of malicious code.

JFrog has reported the issue to PyPI’s security team and advocates for stricter policies to prevent package names from being reused. Users are also advised to remain vigilant and ensure their CI/CD systems do not attempt to install packages that have been removed from PyPI.

Overall, the Revival Hijack technique exposes a critical vulnerability in PyPI’s ecosystem, underscoring the need for enhanced security measures to protect users from supply chain attacks. By raising awareness about this issue and implementing robust security protocols, the cybersecurity community can strengthen the resilience of software supply chains against malicious threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...