![]() ![]() Luckily, these packages were removed before they could rack up a large number of downloads (based on npm records) so we managed to avoid a scenario similar to our last PyPI disclosure, where the malicious packages were downloaded tens of thousands of times before they were detected and removed. ![]() ![]() We disclosed these 17 malicious packages to the npm code maintainers, and the packages were promptly removed from the npm repository - a good indication these packages are indeed causing issues. Put plainly: obtaining a victim’s Discord token gives the attacker full access to the victim’s Discord account. Many of them intentionally seek to attack a user’s Discord token, which is a set of letters and numbers that act as an authorization code to access Discord’s servers. Hot on the heels of that report, we are now sharing the findings of our most recent body of work - disclosing 17 malicious packages in the npm (Node.js package manager) repository that were picked up by our automated scanning tools. The advanced evasion techniques used in the PyPI malware packages signal a disturbing trend that attackers are becoming stealthier in their attacks on open source software. Most recently we disclosed 11 malicious packages in the PyPI repository, a discovery that shows attacks are getting more sophisticated in their approach. The JFrog Security research team continuously monitors popular open source software (OSS) repositories with our automated tooling, and reports any vulnerabilities or malicious packages discovered to repository maintainers and the wider community. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |