Supply-Chain Attack Hits RubyGems Repository with 725 Malicious Packages
upstart writes in with an IRC submission for Fnord666:
Supply-chain attack hits RubyGems repository with 725 malicious packages:
More than 725 malicious packages downloaded thousands of times were recently found populating RubyGems, the official channel for distributing programs and code libraries for the Ruby programming language.
The malicious packages were downloaded almost 100,000 times, although a significant percentage of those are likely the result of scripts that automatically crawl all 158,000 packages available in the repository, Tomislav Pericin, the cofounder and chief software architect of security firm ReversingLabs, told Ars. All of them originated from just two user accounts: "JimCarrey" and "PeterGibbons."
The accounts, which ReversingLabs suspects may be the work of a single individual, used a variation of typosquatting-the technique of giving a malicious file or domain a name that's similar to a commonly recognizable name-to give the impression they were legitimate. For instance, "atlas-client," a booby-trapped package with 2,100 downloads, was a stand-in for the authentic "atlas_client" package. More than 700 of the packages were uploaded from February 16 to 25.
Once installed, the packages executed a script that attempted to intercept Bitcoin payments made on Windows devices.
Read more of this story at SoylentNews.