Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Nothing Phone (4a) Pro Review: A Close Second
    • Match Group CEO Spencer Rascoff says growing women’s share on Tinder is his “primary focus” to stem user declines; Sensor Tower says 75% of Tinder users are men (Kieran Smith/Financial Times)
    • Today’s NYT Connections Hints, Answers for April 20 #1044
    • AI Machine-Vision Earns Man Overboard Certification
    • Battery recycling startup Renewable Metals charges up on $12 million Series A
    • The Influencers Normalizing Not Having Sex
    • Sources say NSA is using Mythos Preview, and a source says it is also being used widely within the DoD, despite Anthropic’s designation as a supply chain risk (Axios)
    • Today’s NYT Wordle Hints, Answer and Help for April 20 #1766
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Monday, April 20
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Supply-chain attacks on open source software are getting out of hand
    News

    Supply-chain attacks on open source software are getting out of hand

    Editor Times FeaturedBy Editor Times FeaturedJuly 26, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    sudo rm -rf --no-preserve-root /

    The –no-preserve-root flag is particularly designed to override security protections that might usually forestall deletion of the basis listing.

    The postinstall script that features a Home windows-equivalent damaging command was:

    rm /s /q

    Socket revealed a separate report Wednesday on but extra supply-chain assaults, one focusing on npm customers and one other focusing on customers of PyPI. As of Wednesday, the 4 malicious packages—three revealed to npm and the fourth on PyPI—collectively had been downloaded greater than 56,000 instances. Socket mentioned it was working to get them eliminated.

    When put in, the packages “covertly combine surveillance performance into the developer’s surroundings, enabling keylogging, display seize, fingerprinting, webcam entry, and credential theft,” Socket researchers wrote. They added that the malware monitored and captured consumer exercise and transmitted it to attacker-controlled infrastructure. Socket used the time period surveillance malware to emphasise the covert statement and information exfiltration techniques “within the context of malicious dependencies.”

    Final Friday, Socket reported the third assault. This one compromised an account on npm and used the entry to plant malicious code inside three packages obtainable on the positioning. The compromise occurred after the attackers efficiently obtained a credential token that the developer used to authenticate to the positioning.

    The attackers obtained the credential by means of a focused phishing assault Socket had disclosed hours earlier. The e-mail instructed the recipient to log in by means of a URL on npnjs.com. The location is a typosquatting spoof of the official npmjs.com area. To make the assault extra convincing, the phishing URL contained a token discipline that mimicked tokens npm makes use of for authentication. The phishing URL was within the format of https://npnjs.com/login?token=xxxxxx the place the xxxxxx represented the token.

    A phishing e mail focusing on npm account holders.

    Credit score:
    Socket

    A phishing e mail focusing on npm account holders.


    Credit score:

    Socket

    Also compromised was an npm bundle generally known as ‘is.’ It receives roughly 2.8 million downloads weekly.

    Potential for widespread injury

    Provide-chain assaults like those Socket has flagged have the potential to trigger widespread injury. Many packages obtainable in repositories are dependencies, which means the dependencies should be integrated into downstream packages for these packages to work. In lots of developer flows, new dependency variations are downloaded and integrated into the downstream packages mechanically.

    The packages flagged within the three assaults are:

    • @toptal/picasso-tailwind
    • @toptal/picasso-charts
    • @toptal/picasso-shared
    • @toptal/picasso-provider
    • @toptal/picasso-select
    • @toptal/picasso-quote
    • @toptal/picasso-forms
    • @xene/core
    • @toptal/picasso-utils
    • @toptal/picasso-typography.
    • is model 3.3.1, 5.0.0
    • got-fetch model 5.1.11, 5.1.12
    • Eslint-config-prettier, variations 8.10.1, 9.1.1, 10.1.6, and 10.1.7
    • Eslint-plugin-prettier, variations 4.2.2 and 4.2.3
    • Synckit, model 0.11.9
    • @pkgr/core, model 0.2.8
    • Napi-postinstall, model 0.3.1

    Builders who work with any of the packages focused ought to guarantee not one of the malicious variations have been put in or integrated into their wares. Builders working with open supply packages ought to:

    • Monitor repository visibility adjustments searching for suspicious or uncommon publishing of packages
    • Overview bundle.json lifecycle scripts earlier than putting in dependencies
    • Use automated safety scanning in steady integration and steady supply pipelines
    • Frequently rotate authentication tokens
    • Use multifactor authentication to safeguard repository accounts

    Moreover, repositories that haven’t but made MFA necessary ought to accomplish that within the close to future.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Match Group CEO Spencer Rascoff says growing women’s share on Tinder is his “primary focus” to stem user declines; Sensor Tower says 75% of Tinder users are men (Kieran Smith/Financial Times)

    April 20, 2026

    Sources say NSA is using Mythos Preview, and a source says it is also being used widely within the DoD, despite Anthropic’s designation as a supply chain risk (Axios)

    April 19, 2026

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)

    April 19, 2026

    Google is in talks with Marvell Technology to develop a memory processing unit that works alongside TPUs, and a new TPU for running AI models (Qianer Liu/The Information)

    April 19, 2026

    At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)

    April 19, 2026

    Comments are closed.

    Editors Picks

    Nothing Phone (4a) Pro Review: A Close Second

    April 20, 2026

    Match Group CEO Spencer Rascoff says growing women’s share on Tinder is his “primary focus” to stem user declines; Sensor Tower says 75% of Tinder users are men (Kieran Smith/Financial Times)

    April 20, 2026

    Today’s NYT Connections Hints, Answers for April 20 #1044

    April 20, 2026

    AI Machine-Vision Earns Man Overboard Certification

    April 20, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Building trust in the AI era with privacy-led UX

    April 15, 2026

    Today’s NYT Connections: Sports Edition Hints, Answers for Feb. 21 #516

    February 21, 2026

    New AT&T Elite 2.0 Phone Plan Boosts Wireless Hotspot and Data Performance

    April 16, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.