IT News · @itnewsbot
3130 followers · 257054 posts · Server schleuss.online
Lola Attenberger · @Lola_Attenberger
24 followers · 112 posts · Server infosec.exchange

Die Firma Applied Materials schätzt, dass ein Ransomware-Angriff auf eine Zulieferfirma - vermutlich MKS Instruments - sie 233 Millionen Euro (250 Mio USD) kosten wird. Applied Materials ist eine Multimilliarden Firma, die Technologie für die Halbleiterinustrie bereitstellt. Der Angriff wird Auswirkungen auf die Lieferkette haben, die zu starken Verzögerungen führen.


therecord.media/applied-materi

#itsecurity #supplychainattacks

Last updated 2 years ago

Astra Kernel :verified: · @AstraKernel
853 followers · 896 posts · Server infosec.exchange
Paul Merlin 🍿 · @eskatos
87 followers · 137 posts · Server mastodon.social

On January 11th 2023, was contacted by MinecraftOnline about two unusual and suspicious Gradle wrapper JARs found in some of their repositories.

Read about the story here
blog.gradle.org/wrapper-attack

Read about how to protect yourself against such here
blog.gradle.org/project-integr

#gradle #supplychainattacks

Last updated 2 years ago

Redbeard · @redbeardsec
4 followers · 14 posts · Server infosec.exchange

Protect your business from supply chain attacks! Learn how to spot suspicious activity and guard against malicious actors.

redbeardsec.com/spotting-suppl

#securityawareness #supplychainattacks #protectyourbusiness

Last updated 2 years ago

Astra Kernel :verified: · @AstraKernel
730 followers · 762 posts · Server infosec.exchange

✨ PyTorch discloses malicious dependency chain compromise over holidays

👉 Malicious dependency with the same name as the framework's 'torchtriton' library

👉 Users who installed PyTorch-nightly over the holidays => Uninstall the framework and the counterfeit 'torchtriton' dependency

bleepingcomputer.com/news/secu

#infosec #supplychain #supplychainattacks #supplychainsecurity #python #machinelearning #pytorch #datascience #artificialintelligence

Last updated 2 years ago

jnazario · @jnazario
268 followers · 124 posts · Server infosec.exchange

Automated Cybercampaign Creates Masses of Bogus Software Building Blocks

"Harush explains the attackers likely invested in automation to poison the NuGet, PyPI, and npm ecosystems because it allows them to create a high volume of packages and user accounts in a short amount of time."

darkreading.com/attacks-breach

#trojan #supplychainattacks #phishing #malware

Last updated 2 years ago

Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable:

Vulnerability in the “rust-lang/rustc_codegen_gcc” repository, and could allow any user to execute code in a privileged pipeline

legitsecurity.com/blog/artifac

@LegitSecurity1

#infosec #rust #rustlang #pentest #vulnerability #supplychainattacks #supplychainsecurity

Last updated 2 years ago

Artifact Poisoning in GitHub Actions Imports Malware via Software Pipelines

FTA: An attacker submitting changes to an open source repository on GitHub could cause downstream software projects that include the latest version of a component to compile updates with malicious code... Legit Security simulated an attack on the project that manages Rust.

darkreading.com/application-se

#malware #github #supplychainattacks

Last updated 2 years ago

allan · @0x9090
2 followers · 5 posts · Server infosec.exchange

you can just arbitrarily upload new builds to existing package versions and clients will just download the latest one, malware or otherwise: stackoverflow.com/a/63944201. Chalk up another reason to use integrity hashes!

#til #pypi #appsec #supplychainattacks

Last updated 2 years ago

farimani · @farimani
84 followers · 46 posts · Server infosec.exchange
Tom Lawrence · @tomlawrence
565 followers · 45 posts · Server infosec.exchange

A recent scoop by Reuters revealed that mobile apps for the U.S. Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh, which claims to be based in the United States.

krebsonsecurity.com/2022/11/u-

#supplychainattacks

Last updated 2 years ago

Marcel SIneM(S)US ☑️ · @simsus
78 followers · 604 posts · Server social.tchncs.de

Great article on software supply chain and the Supply chain Levels for Software Artifacts (SLSA) model in depth by François Proulx.

Red Team, Blue Team, insider threat, external threats. All PoV's on how to commit malicious code and release, or how to mitigate such attacks.

Brilliantly written.

medium.com/boostsecurity/slsa-

#infosec #appsec #supplychainattacks

Last updated 2 years ago

JM · @jmamblat
123 followers · 61 posts · Server ioc.exchange
Christoffer S. · @cstromblad
292 followers · 438 posts · Server ioc.exchange

Well, this doesn't exactly sound good now does it? Socgolish combined with Emotet would be bad combo.

scmagazine.com/analysis/third-

#malware #supplychainattacks

Last updated 2 years ago

Tech News Worldwide · @TechNews
11269 followers · 97984 posts · Server aspiechattr.me

Breach of software maker used to backdoor as many as 200,000 servers

arstechnica.com/?p=1881102

&IT

#supplychainattacks #backdoors #biz

Last updated 2 years ago

IT News · @itnewsbot
1661 followers · 238595 posts · Server schleuss.online

Breach of software maker used to backdoor as many as 200,000 servers - Enlarge (credit: Getty Images)

Fishpig, a UK-based maker of e-... - arstechnica.com/?p=1881102 &it

#biz #backdoors #supplychainattacks

Last updated 2 years ago