Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using a new vulnerability known as “Dependency Confusion”. By utilising this vulnerability, attacks can steal Unix based system password files and open reverse shells back to an attacker.
The attacker creates packages utilising the same names as a company’s internal component or repositories. When these are hosted on public repositories such as NPMs and RubyGems, dependency managers use the packages on the public repository rather than the internal packages.
Thanks to a logical (dependency confusion), the attacker can then inject malicious payloads into the internal application in a supply chain attack.
A successful dependency confusion attack results in an attacker being able to inject their malicious payloads into an internal application and receive a reverse shell, from which they can execute commands remotely.
This issue is hard to mitigate. However, Microsoft’s whitepaper provides several recommendations. A summary is included below. Note that number 1 is the most recommended action and 3 is the least.
Source: Bleeping Computer
Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…
Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…
It is an undeniable fact that all applications and infrastructures are essentially in need of…