this post was submitted on 01 Mar 2024
83 points (98.8% liked)

Technology

59627 readers
3175 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

GitHub besieged by millions of malicious repositories in ongoing attack::GitHub keeps removing malware-laced repositories, but thousands remain.

all 7 comments
sorted by: hot top controversial new old
[–] cyborganism@lemmy.ca 22 points 8 months ago (1 children)

I don't understand why people are so hell bent on breaking everything like this.

[–] whodatdair@lemm.ee 12 points 8 months ago* (last edited 8 months ago) (1 children)

In this case? Money. They’re trying to steal crypto as far as I’ve heard

[–] TypicalHog@lemm.ee 1 points 8 months ago (1 children)

And that's why no one should do crypto stuff on the same OS where they code.

[–] floridaman@lemmy.blahaj.zone 1 points 8 months ago (1 children)

And that's why no one should do crypto stuff. *FTFY

(/s btw I don't care that much)

[–] autotldr@lemmings.world 4 points 8 months ago

This is the best summary I could come up with:


An unknown party has automated a process that forks legitimate repositories, meaning the source code is copied so developers can use it in an independent project that builds on the original one.

“Most of the forked repos are quickly removed by GitHub, which identifies the automation,” Matan Giladi and Gil David, researchers at security firm Apiiro, wrote Wednesday.

We employ manual reviews and at-scale detections that use machine learning and constantly evolve and adapt to adversarial tactics.

Supply-chain attacks that target users of developer platforms have existed since at least 2016, when a college student uploaded custom scripts to RubyGems, PyPi, and NPM.

This form of supply-chain attack is often referred to as typosquatting, because it relies on users making small errors when choosing the name of a package they want to use.

In 2021, a researcher used a similar technique to successfully execute counterfeit code on networks belonging to Apple, Microsoft, Tesla, and dozens of other companies.


The original article contains 620 words, the summary contains 158 words. Saved 75%. I'm a bot and I'm open source!

[–] reflectedodds@lemmy.world 3 points 8 months ago

It's not really fixable, right? They're technically doing what the platform was made to do.