Large companies fight after the supply chain attack spilled their secrets

The open source software used by more than 23,000 organizations, some of them in large companies, was committed to the credential robbery code after the attackers obtained unauthorized access to a maintenance account, in the last open source supply chain attack to increase the internet.

The corrupt package, TJ-Actions/Files changedIt is part of TJ-ActionsA collection of files used by more than 23,000 organizations. TJ-Actions is one of the many Github actionsA platform form to rationalize the software available on the open source developer platform. Actions are a central medium to implement what is known as CI/CDabbreviation for continuous integration and continuous implementation (or continuous delivery).

Scraping server memory on scale

On Friday or before, the source code for all versions of TJ-Actions/Change-Files received unauthorized updates that changed the “labels” that developers use to refer to specific code versions. The labels indicated a publicly available file that copy the internal memory of Severs that executes it, seeks credentials and writes them to a record. In consequences, many public access repositories executed TJ-Actions ended up showing their most sensitive credentials in the records that anyone could see.

“The terrifying part of the actions is that they can often modify the source code of the repository that is using them and access to any secret variable associated with a workflow,” said HD Moore, founder and CEO of Runczero and open source security expert, in an interview. “The most paranoid use of actions is to audit the entire source code, then set the specific confirmation hash instead of the label in the … the workflow, but this is a discomfort.”

#Large #companies #fight #supply #chain #attack #spilled #secrets

Leave a Reply

Your email address will not be published. Required fields are marked *