Загрузка...

A brief explanation of the hack that occurred with npm axios #tech #technews #cybersecurity #npm

While the world was distracted by the personal account breaches of the FBI director a far more surgical strike hit the heart of the JavaScript ecosystem through the Axios npm library. This was a sophisticated Supply Chain Attack that exploited the negligence of a lead developer whose account was compromised to bypass modern security protocols like OIDC Trusted Publishers. The attackers used a Trojan horse technique by first pushing a legitimate-looking update to build false trust before releasing infected versions 1.14.1 and 0.30.4 which contained a hidden dependency called plain-crypto-js. This malicious package triggered a postinstall script that acted as a cross-platform RAT dropper targeting Windows macOS and Linux systems. Once executed the malware establishes a connection to a C2 server allowing hackers to stalk and control infected devices remotely. What makes this breach a masterclass in anti-forensics is that the script performs a self-cleanup by deleting its malicious files and overwriting the package.json with a clean decoy version to wipe any evidence of the intrusion. Although the compromised versions were pulled from the npm registry within two hours the incident serves as a live warning to audit your lockfiles and avoid pinning to latest in production. This event proves that in a world of automated CI/CD the weakest link remains human credential management and the lack of 2FA.

Видео A brief explanation of the hack that occurred with npm axios #tech #technews #cybersecurity #npm канала snow egg
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять