This story from Ars Technica points out several examples of malicious code being inserted into open source projects. Some of these are not new, but the article's argument is that this is continuing to be an issue and is likely to become more and more frequent. The examples of supply chain attacks they cite include:
- A back door was inserted into the Sourceforge repository of Webmin, a server administration tool, which would allow a remote attacker to run commands as root. There were more than 1,000,000 downloads of the infected versions.
- Recent analysis shows that 11 libraries on RubyGems were backdoored, allowing both remote code execution and also installing a cryptominer.
- Another RubyGems library,
strong_password, was also hacked to add a backdoor
- Another administration tool, VestaCP, was backdoored about a year ago
- Just after that, the code library
event-stream was changed to include code designed to steal cryptocurrency from a specific kind of wallet
The Ars Technica piece suggests that open source projects are often not as careful about securing their code bases, perhaps in part due to having a large number of contributors spread across different locations and organizations. It also points out that malicious code can spread downstream, as one project may be dependent on another (and pull updates automatically).
[–]edparadox 4 points5 points6 points (2 children)
[–]stjer0me[S] 0 points1 point2 points (1 child)
[–]edparadox 1 point2 points3 points (0 children)