In yet another sign that developers continue to be targets of software supply chain attacks, Phylum reports that it has found malicious Rust packages on the Rust programming language’s crate registry.
The libraries, originally uploaded between August 14 and 16, 2023, were published by a user named Amaperf.
Phylum explains in a report published last week that these malicious packages can be exfiltrated via HTTP, HTTPS, DNS, or FTP.
It warns developers that this type of attack is extremely valuable because it allows an attacker to gain access to a developer’s company IP address and then reverts to exfilting their data via DNS once they have obtained this information from the victim.
Phylum provides a list of the malicious packages and the names of the affected libraries, which are as follows: postgress, ifcfg, xrvrv, serd, oncecell, lazystatic, and envlogger.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply