A so-called software supply chain attack, in which hackers corrupt a legitimate piece of software to hide their own malicious code, was once a relatively rare event but one that haunted the cybersecurity world with its insidious threat of turning any innocent application into a dangerous foothold in a victim’s network. Now one group of cybercriminals has turned that occasional nightmare into a near-weekly episode, corrupting hundreds of open source tools, extorting victims for profit, and sowing a new level of distrust in an entire ecosystem used to create the world’s software.
On Tuesday night, open source code platform GitHub announced that it had been breached by hackers in one such software supply chain attack: A GitHub developer had installed a “poisoned” extension for VSCode, a plug-in for a commonly used code editor that, like GitHub itself, is owned by Microsoft. As a result, the hackers behind the breach, an increasingly notorious group called TeamPCP, claim to have accessed around 4,000 of GitHub’s code repositories. GitHub’s statement confirmed that it had found at least 3,800 compromised repositories while noting that, based on its findings so far, they all contained GitHub’s own code, not that of customers.
“We are here today to advertise GitHub’s source code and internal orgs for sale,” TeamPCP wrote on BreachForums, a forum and marketplace for cybercriminals. “Everything for the main platform is there and I very am happy to send samples to interested buyers to verify absolute authenticity.”Read full article
Comments
谷歌近日发布名为"Always On AI Agent"的颠覆性AI服务,提供7×24小时不间断的数据分析与任务自动化处理。该系统通过Gemini多模态架构整合用户数字服务,利用过去20年数据构建个人行为模型,并强调本地隐私保护。与现有AI相比,其优势在于主动交互能力、庞大的数据整合量及谷歌生态的无缝衔接。业内专家认为,该服务将改变人机交互方式,但也引发隐私伦理争议——尽管谷歌承诺严格的数据处理原则。