Open Source Malware Index Q1 2025: Data exfil threats rising sharply

Open Source Malware Index Q1 2025: Data exfil threats rising sharply

Sonatype's ongoing mission is to equip organizations with the most up-to-date information on open source security threats. As part of that commitment, we will be sharing data and insights on a quarterly ...
Fake IP checker utilities on npm are crypto stealers

Fake IP checker utilities on npm are crypto stealers

Recently identified npm packages called "node-request-ip", "request-ip-check" and "request-ip-validator" impersonate handy open source utilities relied upon by developers to retrieve an external IP address but instead target Windows, Linux and macOS users ...
The HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources

The HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources

The HTML, CSS and Javascript Trojan Horse — Smuggling Malware through Web Resources‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAt DEF CON 32, SquareX ...
A Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web…

A Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web…

A Picture is Worth a Thousand Threats: Using Steganography to Deliver Malware Past Secure Web Gateways‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAt ...
WebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways

WebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways

‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAt DEF CON 32, SquareX presented groundbreaking research curating vulnerabilities in Secure Web Gateways (SWGs) ...
'Netfetcher' package drops illicit 'node' binary on Windows

‘Netfetcher’ package drops illicit ‘node’ binary on Windows

Recently identified PyPI packages called "netfetcher" and "pyfetcher" impersonate open source libraries and target Windows users with malicious executables that have a zero detection rate among leading antivirus engines. Furthermore, some of ...
Exploit creator selling 250+ reserved npm packages on Telegram

Exploit creator selling 250+ reserved npm packages on Telegram

Recently, the Sonatype Security Research team identified more than 250 npm packages which are lucrative and convincing exploits, because these are named exactly like the open source projects coming from Amazon Web ...
'cors-parser' npm package hides cross-platform backdoor in PNG files

‘cors-parser’ npm package hides cross-platform backdoor in PNG files

'cors-parser' is neither a cure for Cross-Origin Resource Sharing (CORS) vulnerabilities nor a "parser" for interpreting same-origin policies of a website. Instead, the npm package employs a form of steganography to download ...
Russia-linked 'Lumma' crypto stealer now targets Python devs

Russia-linked ‘Lumma’ crypto stealer now targets Python devs

Imagine being a developer who's building the next-gen crypto app by using popular open source components to speed up coding. Instead, you end up including a package in your build that, does ...