Devs flood npm with 15,000 packages to reward themselves with Tea 'tokens'

Devs flood npm with 15,000 packages to reward themselves with Tea ‘tokens’

We have repeatedly come across cases involving open source registries like npm and PyPI being flooded with thousands of packages in a short span of time. Typically, such surges in publishing activity ...
npm packages spread 'Bladeroid' crypto-stealer, hijack your Instagram

npm packages spread ‘Bladeroid’ crypto-stealer, hijack your Instagram

Sonatype has identified multiple open source packages named sniperv1, sniperv2, among others that infect npm developers with a Windows info-stealer and crypto-stealer called 'Bladeroid.' ...
The curious case of 'csrf-magic': A case study in supply chain poisoning

The curious case of ‘csrf-magic’: A case study in supply chain poisoning

Back in the day, Ivanti disclosed CVE-2021-44529, a critical "code injection" vulnerability in its EPM Cloud Services Appliance (CSA) product ...
Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack

Decrypting the Ledger connect-kit compromise: A deep dive into the crypto drainer attack

Earlier today, Ledger, a maker of hardware wallets for storing crypto, announced that they had identified malicious software embedded in one of their open source packages called @ledgerhq/connect-kit. This package is widely ...
A guide for open source software (OSS) security

A guide for open source software (OSS) security

When you search for a dependable open source software (OSS) component to integrate into your software supply chain, evaluation of the component’s security emerges as a critical task. This involves not only ...
Enhancing software supply chain security: New Sonatype product capabilities

Enhancing software supply chain security: New Sonatype product capabilities

We are thrilled to announce the latest enhancements for Sonatype Repository Firewall, Sonatype Nexus Repository, and Sonatype Lifecycle. The enhanced capabilities empower organizations to exert more control over their software development life ...
“Quoi...? feur” from meme to malware – PyPI package targets Windows with ‘NullRAT’ info-stealer

“Quoi…? feur” from meme to malware – PyPI package targets Windows with ‘NullRAT’ info-stealer

We’ve got a rather interesting malicious finding this month to talk about, the one that mixes a meme with malware ...

A Closer Look: Differentiating Software Vulnerabilities and Malware

In today’s interconnected digital world, vulnerabilities and malware in open source software pose significant threats to the security and integrity of your software supply chain. While these two terms may appear synonymous ...
Protecting Software Developers from Malware with AI/ML Insights

Protecting Software Developers from Malware with AI/ML Insights

In my last post I talked about solutions to address malware and the increase in attacks. Today I’ll dig into what’s necessary to find and avoid malware ...