More

    A cracked malicious version of a Go package lay undetected online for years




    • Someone forked a popular database module and fitted it with malware
    • The malicious fork was then cached and stored indefinitely
    • It was then creatively hidden in plain sight to target Go developers

    A software supply chain attack targeting developers on the Go platform was apparently hiding in plain sight for three years to spread malware, experts have warned.

    Cybersecurity researchers from Socket Security uncovered and publicly spoke about the campaign, which started back in 2021, when someone took a relatively popular database module called BoltDB on GitHub and forked it. In the fork, they added malicious code, which granted the attacker backdoor access to compromised computers.

    https://cdn.mos.cms.futurecdn.net/2viAsX89eJReYQEQ3i3SwH-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img