Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsA Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale - Wired
A so-called software supply chain attack, in which hackers corrupt a legitimate piece of software to hide their own malicious code, was once a relatively rare event but one that haunted the cybersecurity world with its insidious threat of turning any innocent application into a dangerous foothold in a victims network. Now one group of cybercriminals has turned that occasional nightmare into a near-weekly episode, corrupting hundreds of open source tools, extorting victims for profit, and sowing a new level of distrust in an entire ecosystem used to create the worlds software.
On Tuesday night, open source code platform GitHub announced that it had been breached by hackers in one such software supply chain attack: A GitHub developer had installed a poisoned extension for VSCode, a plug-in for a commonly used code editor that, like GitHub itself, is owned by Microsoft. As a result, the hackers behind the breach, an increasingly notorious group called TeamPCP, claim to have accessed around 4,000 of GitHubs code repositories. GitHubs statement confirmed that it had found at least 3,800 compromised repositories while noting that, based on its findings so far, they all contained GitHubs own code, not that of customers.
We are here today to advertise GitHubs source code and internal orgs for sale, TeamPCP wrote on BreachForums, a forum and marketplace for cybercriminals. Everything for the main platform is there and I very am happy to send samples to interested buyers to verify absolute authenticity.
The GitHub breach is just the latest incident in what has become the longest-running spree of software supply chain attacks ever, with no end in sight. According to cybersecurity firm Socket, which focuses on software supply chains, TeamPCP has, in just the last few months, carried out 20 waves of supply chain attacks that have hidden malware in more than 500 distinct pieces of software, or well over a thousand counting all of the various versions of the code that TeamPCP has hijacked.
Those tainted pieces of code have allowed TeamPCPs hackers to breach hundreds of companies that installed the software, says Ben Read, who leads strategic threat intelligence at the cloud security firm Wiz. GitHub is only the latest on the groups long list of victims, which has also included AI firm OpenAI and the data contracting firm Mercor. It may be their biggest one," Read says of the GitHub breach. But each one of these is a big deal for the company that it happens to. It's not qualitatively different from the 14 breaches that happened last week.
On Tuesday night, open source code platform GitHub announced that it had been breached by hackers in one such software supply chain attack: A GitHub developer had installed a poisoned extension for VSCode, a plug-in for a commonly used code editor that, like GitHub itself, is owned by Microsoft. As a result, the hackers behind the breach, an increasingly notorious group called TeamPCP, claim to have accessed around 4,000 of GitHubs code repositories. GitHubs statement confirmed that it had found at least 3,800 compromised repositories while noting that, based on its findings so far, they all contained GitHubs own code, not that of customers.
We are here today to advertise GitHubs source code and internal orgs for sale, TeamPCP wrote on BreachForums, a forum and marketplace for cybercriminals. Everything for the main platform is there and I very am happy to send samples to interested buyers to verify absolute authenticity.
The GitHub breach is just the latest incident in what has become the longest-running spree of software supply chain attacks ever, with no end in sight. According to cybersecurity firm Socket, which focuses on software supply chains, TeamPCP has, in just the last few months, carried out 20 waves of supply chain attacks that have hidden malware in more than 500 distinct pieces of software, or well over a thousand counting all of the various versions of the code that TeamPCP has hijacked.
Those tainted pieces of code have allowed TeamPCPs hackers to breach hundreds of companies that installed the software, says Ben Read, who leads strategic threat intelligence at the cloud security firm Wiz. GitHub is only the latest on the groups long list of victims, which has also included AI firm OpenAI and the data contracting firm Mercor. It may be their biggest one," Read says of the GitHub breach. But each one of these is a big deal for the company that it happens to. It's not qualitatively different from the 14 breaches that happened last week.
https://www.wired.com/story/teampcp-software-supply-chain-attack-spree-github/]
4 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
A Hacker Group Is Poisoning Open Source Code at an Unprecedented Scale - Wired (Original Post)
justaprogressive
8 hrs ago
OP
Cybersecurity is a fail. Need CyberPolice. Until they put these clowns behind bars for decades
bucolic_frolic
8 hrs ago
#1
bucolic_frolic
(55,885 posts)1. Cybersecurity is a fail. Need CyberPolice. Until they put these clowns behind bars for decades
nothing will change.
Nittersing
(8,514 posts)2. I wonder when AI will take over for hackers?
whopis01
(3,933 posts)3. It already is and increasing at an alarming rate.
AI is very good at code analysis. Particularly good at looking for patterns in the code. Using that to find previously undiscovered flaws in large code bases is widely done today.
dalton99a
(95,420 posts)4. Kick