A new supply chain attack uses unused S3 buckets to spread malicious binaries.

 A worrying new kind of software supply chain attack has surfaced, one that uses abandoned Amazon S3 buckets to spread malicious binaries to open source projects. Threat actors can now utilise these infected buckets to serve rogue binaries to unwitting users without changing the original modules themselves.



Guy Nachshon, a Checkmarx researcher, has shed light on this attack vector and discovered that the malicious binaries are made to collect private data, such as user IDs, passwords, local machine environment variables, and local host names. The hijacked bucket is subsequently used to exfiltrate the stolen data, giving threat actors access to it for their own purposes.

The attack was first identified in connection with the npm package bignum. Up until version 0.13.0 of the package, installation required downloading pre-built binary versions of the node-pre-gyp addon from an Amazon S3 bucket. However, a hostile third party has now claimed a defunct S3 bucket on which the binaries were hosted. Thus, those that downloaded the package after the bucket's expiration unwittingly downloaded malware-containing binaries.

An unidentified threat actor used the opportunity provided by the previously active S3 bucket as part of their assault strategy. The reference inside the package continued to refer to the bucket as its source even after the bucket was deleted. By taking advantage of this anomaly, the attacker changed the bucket's pointer to serve the malicious binaries to users.

The malware sample's capabilities were revealed through a reverse engineering investigation. It has the capacity to steal user credentials and extract information about the environment before sending it to the same hacked bucket. Numerous packages that still rely on abandoned S3 buckets have been found by Checkmarx researchers, making them open to this innovative attack method. The fact that threat actors are continuously looking for novel ways to infiltrate the software supply chain is starkly illustrated by this discovery.





Guy Nachshon from Checkmarx cautioned developers and organisations, "This new twist in the world of subdomain takeovers serves as a wake-up call to developers and organisations." He emphasised that defunct subdomains or hosting buckets shouldn't be written off as lost artefacts. These underutilised resources have the potential to be powerful tools for data theft and penetration in the wrong hands.

This development comes shortly after cybersecurity company Cyble made a recent discovery. Over 45,000 malicious Python packages were downloaded, according to the business, which found 160 of them. These packages had code that might extract login information and payment card information. Together, these episodes show how the open-source ecosystem is facing increased dangers and challenges.

These supply chain assaults have wide-ranging effects since they can have an effect on both ordinary users and businesses that depend on open source software. Organisations and developers must maintain vigilance, putting in place strong security safeguards and undertaking in-depth risk analyses of their software dependencies. Critical steps in reducing the dangers provided by these new attack vectors include timely patching and routine monitoring of potential vulnerabilities, including abandoned resources like S3 buckets.

Maintaining up-to-date knowledge on security alerts and recommended procedures for secure software development should be a priority for software developers and maintainers. To quickly find and fix vulnerabilities, cooperation and information sharing among software developers are crucial.

It is crucial that the cybersecurity community and industry stakeholders work together to bolster defences, improve threat intelligence sharing, and advance safe development practises as threat actors continue to refine their strategies. We can only successfully address the changing threats posed by software supply chain attacks and safeguard the integrity of open source software by working together.

Comments

Popular posts from this blog

Microsoft Issues a Warning Regarding a New State-Sponsored Hacker Group in Russia With Negative Intent

A New Report Exposes Shuckworm's Persistent Hacks Against Ukrainian Organisations

A Framework for Improved Security: Continuous Threat Exposure Management (CTEM)