Look at your repos … A steam code that will enter lib NPM is common (2m downloads per week) • Register


A widely used Node.js code library that was registered in an NPM product was changed to include crypto-coin-stealing malware. The lib is in question, stream event, downloaded around two million times a week with application programmers.

This damage is a strong reminder of the dangers that depend on deep and complex areas of dependence in software: if no precaution is taken across the entire chain, you can change any part to open the security of the app. If your project uses stream event in some way, and you should check to make sure you did not get the sad version while & # 39; what you were trying to or do; used.

Here's how everything started: GitHub's developer identified a "right 9 direction" voluntarily to take over stream event, built by another dev. The JavaScript has been updated in detail to include another module, flatmap-stream, which was then developed to install Bitcoin-siphoning Bitware – a & # 39; again worrying again that those who do not have third party packages to their apps know what code they may be.

A timeline can be found here, but in a short time: on 9 September, right added flatmap-stream as independence stream event, and then on 16 September, put them out of dependence by applying their own code. However, this last change has not been automatically converted to library users. On October 5, flatmap-stream changed by a user called "hugeglass" to create a code that was made to attack; Try to breathe Bitcoins from pockets by using its & # 39; Software.

So a person will use it stream event and drag into the curse flatmap-stream, instead of its code, because the 5 October could have been hit by the scripture sad. The guilty code was deleted stream eventIf you have any respiration, hidden malware is extremely popular, and it is not designed to invoke each programmer or request it; used stream eventSouth Westerly

RSS feeds

Ayrton Sparling, a computing student at the California State University, Fullerton (FallingSnow on GitHub), showed the difficulty of the week in GitHub topics. According to Sparling, his promise stream event module added flatmap-stream as an event, which then included a in-set code; focus on another folder, spreadSouth Westerly

The code is lucky [email protected] – Daff Copay Bitcoin seems to have been trying to steal stolen – hosted GitHub and was released through the NTP Package Manager (NPM) until being removed from the NPM registration on Monday. this week.

In an email statement to The Register Today, NPM spokesman said, "At 9:18 PT this morning, independence flatmap-stream was published, and shortly after 9:30 p.m. in the morning, NPM Inc controlled him stream event package. "The NPM spokesman said that his case is currently being scrutinized.

EventStream was created by Dominic Tarr, a New Zealand-based developer who stopped his code. According to Three, it is right to be posted by email to say it was supposed to take over the project, and it was given the opportunity that Tarr was no longer interested in & # 39; look after him.

Malware Brush Now: an NPM package will be a & # 39; come in with a fast-to-use comedy device


The Register an e-mail right9 control, based in Tokyo if the GitHub profile is the right person, but we have not received any response. A servant who is used for the attack is run by a service provider who runs out of Kuala Lumpur, Malaysia. Perhaps this is right that the deputy had no idea flatmap-stream to be taken to smuggle its code by going to & # 39; attacking the platform when it is updated stream event to use the module.

Some developers who comment on GitHub's questions are posted and elsewhere criticized Tarr because there is insufficient knowledge of the community. code about change stream eventproperty. Others show that the Software is specially a & # 39; eliminate any obligation and do not have to behave for a reliable code that is invalid. come with any warranty.

In a telephone interview with The Register, NPM's security defender Adam Baldwin said: "Based on our current survey, which is not yet completely, the early signs suggest that it is a huge attack, 39; on the Bitcoin platform. "

Baldwin said that NPM had not yet accumulated data on the number of people who downloaded a & # 39; Code that was installed for their Node.js applications. It reinforced the 3.3.6 version of EventStream, which included the flatmap-stream independence, released on September 9, and the difficult turning flatmap-stream appear on 5 October.

"Payability is only a denial if it's run in a certain environment," he said. "The most expensive payment we have seen so far."

But as the attack is so attractive, Baldwin is expecting his impact to be so small.

Repo Website

NPM and other code centers such as Python's PyPI and Ruby's RubyGems have been dealing with the problems of libraries with a dangerous package for years. Despite being & # 39; defending how to scan automatic content and reporting system, the dangers do not appear to be long-term & Free people have to uninstall a code.

However, the form of dependency – in which a distinctive version is more than a range of essential versions – it can help.

Asked about how this situation could be avoided in the future, Baldwin gave out that there was an irrelevant code and code ownership; Given problems that may arise. He credited to the NPM community for identifying its & # 39; The code was unsure and said if the organization was tightening things so much that it did not; Anyone can publish a code, it would hurt the community.

"We need to be able for keepers to move forward," he said. "At the same time, its community is amazing because there are many eyes on projects." ®

Source link