helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

169
active users

#supplychain

0 posts0 participants0 posts today
Continued thread

StepSecurity has posted another entry on this topic:

stepsecurity.io/blog/reviewdog

The security incident involves a malicious payload in reviewdog GitHub Actions that targets the Runner.Worker process to extract secrets. The exploit uses a Python script that reads the process memory of the GitHub Actions runner to access stored secrets. The malicious code was found in commit SHA f0d342d24037bb11d26b9bd8496e0808ba32e9ec of reviewdog/action-setup. The script works by identifying the Runner.Worker process, mapping its memory regions, and reading the contents, which are then printed to stdout, effectively exposing secrets in build logs. This technique is similar to the previously reported tj-actions/changed-files incident.

www.stepsecurity.ioreviewdog GitHub Actions are compromised - StepSecurityreviewdog GitHub Actions are compromised

It would appear as if Wiz may have discovered another supply-chain compromise:

wiz.io/blog/new-github-action-

The attack involved compromising the v1 tag of reviewdog/action-setup between March 11th 18:42 and 20:31 UTC. Unlike the tj-actions attack that used curl to retrieve a payload, this attack directly inserted a base64-encoded malicious payload into the install.sh file. When executed, the code dumped CI runner memory containing workflow secrets, which were then visible in logs as double-encoded base64 strings. The attack chain appears to have started with the compromise of reviewdog/action-setup, which was then used to compromise the tj-actions-bot Personal Access Token (PAT), ultimately leading to the compromise of tj-actions/changed-files. Organizations are advised to check for affected repositories using GitHub queries, examine workflow logs for evidence of compromise, rotate any leaked secrets, and implement preventive measures like pinning actions to specific commit hashes rather than version tags.

wiz.io · GitHub Action supply chain attack: reviewdog/action-setup | Wiz BlogA supply chain attack on tj-actions/changed-files leaked secrets. Wiz Research found another attack on reviewdog/actions-setup, possibly causing the compromise.
Continued thread

#trading data & economic studies suggest #consumers in the #US will see higher #prices on a products from vegetables & meat to cellphones & cars. While a few companies may not pass on the cost of the #tariff, many are likely to raise prices on their products.
“Because of the combination of these 3 countries, it’s going to be difficult to go down an aisle of a grocery store & not see some sort of inflationary effect,” said Jason Miller, a prof of #SupplyChain management at Michigan State.
#Trump

From Credit Card Skimming to Exploiting Zero-Days

XE Group, a cybercriminal organization active since 2013, has evolved from credit card skimming to exploiting zero-day vulnerabilities. The group initially focused on web vulnerabilities and supply chain attacks but has now shifted to targeted information theft in manufacturing and distribution sectors. They have demonstrated increased sophistication by exploiting previously undocumented vulnerabilities in VeraCore software, including an SQL injection flaw and an upload validation vulnerability. XE Group maintains long-term access to compromised systems, as evidenced by their reactivation of a webshell planted years earlier. Their recent activities involve exfiltrating config files, network reconnaissance, and deploying a Remote Access Trojan using obfuscated PowerShell commands. The group's evolution highlights their adaptability and growing threat to supply chain security.

Pulse ID: 67a1237da9ade8e303e6d713
Pulse Link: otx.alienvault.com/pulse/67a12
Pulse Author: AlienVault
Created: 2025-02-03 20:13:49

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Continued thread

…All of these businesses—whether from #Asia, #Europe or the #UnitedStates —would also have to contend with any added duties on components they import from #China, which remains the go-to source of many of the parts, tools & equipment.

[all of those costs, #tariffs, #taxes, #duties, #SupplyChain rerouting, shipping, relocation, etc, get passed on to the #consumer. #Prices for American consumers will go up.]

Last week the Python package "Ultralytics" suffered a supply-chain attack on its build and release process. This is a review of the attack from @pypi's perspective.

There's plenty of advice for how Python projects can increase their #security posture for their processes and repositories, please take a look:

#security #supplychain

blog.pypi.org/posts/2024-12-11

blog.pypi.orgSupply-chain attack analysis: Ultralytics - The Python Package Index BlogAnalysis of a package targeted by a supply-chain attack to the build and release process