Rust developers beware: malicious libraries caught transmitting OS info to Telegram channel

by

in
Rust developers beware: malicious libraries caught transmitting OS info to Telegram channel

In yet another sign that developers continue to be targets of software supply chain attacks, Phylum reports that it has found malicious Rust packages on the Rust programming language’s crate registry.

The libraries, originally uploaded between August 14 and 16, 2023, were published by a user named Amaperf.

Phylum explains in a report published last week that these malicious packages can be exfiltrated via HTTP, HTTPS, DNS, or FTP.

It warns developers that this type of attack is extremely valuable because it allows an attacker to gain access to a developer’s company IP address and then reverts to exfilting their data via DNS once they have obtained this information from the victim.

Phylum provides a list of the malicious packages and the names of the affected libraries, which are as follows: postgress, ifcfg, xrvrv, serd, oncecell, lazystatic, and envlogger.

#shorts #techshorts #technews #tech #technology #campaign #company IP #developers

๐Ÿ‘‹ Feeling the vibes?

Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐Ÿ›๏ธ

If not, consider contributing to my caffeine supply at Buy Me a Coffee โ˜•๏ธ.

Your clicks = cosmic support for more awesome content! ๐Ÿš€๐ŸŒˆ


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *