Glassworm attack: credential theft via blockchain
A widespread malicious campaign, dubbed Glassworm, has targeted 151 GitHub repositories and VS Code development environments. The attack focuses on exfiltrating sensitive information, including access tokens, authentication credentials, and corporate secrets, leveraging blockchain technology to mask its activities.
The technique used by cybercriminals involves inserting malicious code into seemingly innocuous open source projects. Once a developer downloads and uses the compromised code, the malware activates, beginning to collect credentials present in the development environment. The stolen data is then transferred through the blockchain, making it more difficult to track illicit activities.
This type of attack underscores the growing importance of adopting robust security measures in the software supply chain, carefully verifying the provenance and integrity of open source libraries and components used in projects. For those evaluating on-premise deployments, there are trade-offs to consider, as discussed in AI-RADAR's analytical frameworks on /llm-onpremise.
The compromise of GitHub repositories and VS Code environments represents a significant threat to data security and the intellectual property of companies using these platforms for software development.
๐ฌ Comments (0)
๐ Log in or register to comment on articles.
No comments yet. Be the first to comment!