Malicious Open-Source Packages Use Trojanized Patches to Infect Local Software

A recent report by ReversingLabs highlights a new tactic employed by cybercriminals involving malicious open-source software packages that apply Trojanized patches to legitimate software already installed on users' machines. One such package, "pdf-to-office," was found on the npm repository, masquerading as a tool for converting PDFs to Office documents. Upon execution, it ran an obfuscated JavaScript file named "pdftodoc," which searched for popular cryptocurrency wallets like Atomic and Exodus. If detected, it replaced legitimate files with compromised versions, effectively compromising the user's system. This approach allows attackers to bypass traditional defenses by targeting trusted software post-installation, marking a shift in software supply chain attack strategies.  

https://www.darkreading.com/cloud-security/open-source-poisoned-patches-infect-local-software

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

OWASP SAMM Skills Framework Enhances Software Security Roles