Friday, April 23, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

Over 700 Malicious Typosquatted Libraries Found On RubyGems Repository

April 16, 2020
in Internet Privacy
Over 700 Malicious Typosquatted Libraries Found On RubyGems Repository
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

As developers increasingly embrace off-the-shelf software components into their apps and services, threat actors are abusing open-source repositories such as RubyGems to distribute malicious packages, intended to compromise their computers or backdoor software projects they work on.

In the latest research shared with The Hacker News, cybersecurity experts at ReversingLabs revealed over 700 malicious gems — packages written in Ruby programming language — that supply chain attackers were caught recently distributing through the RubyGems repository.

You might also like

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware

Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations

The malicious campaign leveraged the typosquatting technique where attackers uploaded intentionally misspelled legitimate packages in hopes that unwitting developers will mistype the name and unintentionally install the malicious library instead.

ReversingLabs said the typosquatted packages in question were uploaded to RubyGems between February 16 and February 25, and that most of them have been designed to secretly steal funds by redirecting cryptocurrency transactions to a wallet address under the attacker’s control.

In other words, this particular supply chain attack targeted Ruby developers with Windows systems who also happened to use the machines to make Bitcoin transactions.

After the findings were privately disclosed to RubyGems maintainers, the malicious gems and associated attackers’ accounts were removed, almost two days later on February 27.

“Being closely integrated with the programming languages, the repositories make it easy to consume and manage third-party components,” the cybersecurity firm said.

“Consequently, including another project dependency has become as easy as clicking a button or running a simple command in the developer environment. But just clicking a button or running a simple command can sometimes be a dangerous thing, as threat actors also share an interest in this convenience by compromising developer accounts or their build environments, and by typosquatting package names,” it added.

Typosquatting Ruby Gems to Steal Cryptocurrency

Typosquatting is a form of brandjacking attack that typically relies on users putting themselves in harm’s way by mistyping a web address or a library name that impersonates popular packages in software registries.

RubyGems is a popular package manager that makes it easy for developers to distribute, manage, and install Ruby programs and libraries.

rubygem typosquatting malware

Using a list of popular gems as a baseline for their investigation, researchers monitored new gems that were published in the repository and flagged any such library which had a similar name from the baseline list.

What they found were several packages — such as “atlas-client” posing as the “atlas_client” gem — containing portable executables (PEs) that masqueraded as a seemingly harmless image file (“aaa.png”).

During installation, the image file is renamed from ‘aaa.png’ to ‘a.exe’ and executed, which contains a VBScript encoded in Base64 that helps the malware gain persistence on the infected system and run every time it is started or rebooted.

Besides this, not only does the VBScript capture the victim’s clipboard data continuously but if it finds that the clipboard content matches the format of a cryptocurrency wallet address, it replaces the address with an attacker-controlled alternative (“1JkU5XdNLji4Ugbb8agEWL1ko5US42nNmc”).

“With this, the threat actor is trying to redirect all potential cryptocurrency transactions to their wallet address,” ReversingLabs researchers said.

rubygem typosquatting malware

Although no transactions were made to this wallet, all the malicious gems were traced to two account holders, “JimCarrey” and “PeterGibbons,” with “atlas-client” registering 2,100 downloads, approximately 30% of the total downloads racked up by the legitimate “atlas_client” gem.

Typosquatting in Software Packages on the Rise

This is not the first time typosquatting attacks of this kind have been uncovered.

Popular repository platforms such as Python Package Index (PyPi) and GitHub-owned Node.js package manager npm have emerged as effective attack vectors to distribute malware.

Given the lack of scrutiny involved during the package submission, review, and approval, it’s been easy for malware authors to publish trojanized libraries with names very close to existing packages.

It’s highly recommended that developers who unintentionally downloaded the libraries into their projects should check to see if they’ve used the correct package names and did not accidentally use the typosquatted versions.


Credit: The Hacker News By: noreply@blogger.com (Ravie Lakshmanan)

Previous Post

How to build robust anomaly detectors with machine learning

Next Post

Kernel vulnerabilities in Android devices using Qualcomm chips explored

Related Posts

1-Click Hack Found in Popular Desktop Apps — Check If You’re Using Them
Internet Privacy

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

April 22, 2021
Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware
Internet Privacy

Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware

April 22, 2021
Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations
Internet Privacy

Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations

April 22, 2021
Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn’t paid
Internet Privacy

Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn’t paid

April 22, 2021
Improve Your Cyber Security Posture by Combining State of the Art Security Tools
Internet Privacy

Improve Your Cyber Security Posture by Combining State of the Art Security Tools

April 21, 2021
Next Post
Kernel vulnerabilities in Android devices using Qualcomm chips explored

Kernel vulnerabilities in Android devices using Qualcomm chips explored

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Basic laws of physics spruce up machine learning
Machine Learning

Can machine learning improve debris flow warning?

April 23, 2021
58 Resources To Help Get Started With Deep Learning ( In TF ) | by Shubham Panchal | Apr, 2021
Neural Networks

58 Resources To Help Get Started With Deep Learning ( In TF ) | by Shubham Panchal | Apr, 2021

April 23, 2021
An ideal time for online events to get a makeover
Digital Marketing

What do attendees want from your presentation?: Thursday’s daily brief

April 23, 2021
SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
1-Click Hack Found in Popular Desktop Apps — Check If You’re Using Them
Internet Privacy

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

April 22, 2021
What Does The Future Hold For the Companies Developing Mobile Apps
Data Science

What Does The Future Hold For the Companies Developing Mobile Apps

April 22, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Can machine learning improve debris flow warning? April 23, 2021
  • 58 Resources To Help Get Started With Deep Learning ( In TF ) | by Shubham Panchal | Apr, 2021 April 23, 2021
  • What do attendees want from your presentation?: Thursday’s daily brief April 23, 2021
  • SolarWinds hack analysis reveals 56% boost in command server footprint April 22, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates