TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cryptocurrency Miner Masquerading as GCC Compiler Found in NPM Package

18 pointsby freedudeover 1 year ago

3 comments

naruhodoover 1 year ago
&gt; Humorously, the attacker accidentally published their entire directory structure for this attack in one of the gcc-builder versions. If we weren&#x27;t confident in our assessment before, we can say without a shadow of a doubt that this is in fact XMR miner masquerading as GCC.<p>Cut him some slack. He&#x27;s only 12.
cozzydover 1 year ago
This is why I use my distro package manager and get annoyed when someone wants me to use something else...
评论 #37371295 未加载
louislangover 1 year ago
Happy to see this on HN! I&#x27;m one of the co-founders @ Phylum.<p>We actively monitor and report on malware and software supply chain attacks across multiple ecosystems. Most notably, we were the first to identify and report on attacks carried out by North Korean state actors in NPM [1], prevented an early typosquat campaign against Rust developers on crates.io [2] and recently a faux email validation utility with a fairly complicated attack chain [3].<p>We&#x27;ve been monitoring npm the longest, and while I wouldn&#x27;t classify this particular attack as complex or sophisticated, it&#x27;s interesting in that it continues the trend of targeting build systems (and more generally, developers).<p>Our goal is to help clean up as many of these registries as possible, and to provide developers with the tooling to better protect themselves from attack. In doing so, we&#x27;re open sourcing as many things as we can. We recently open sourced our sandbox [4] that helps lock down disk&#x2F;networking&#x2F;env during process execution and have baked this into our open source cli so you can do things like:<p><pre><code> phylum npm install &lt;pkg&gt; </code></pre> To be clear, this particular package did not execute code during install, so the sandbox wouldn&#x27;t have come into play, but it would have been blocked by the pre-check against Phylum&#x27;s API.<p>Would greatly appreciate any feedback on our extensions and suggestions for improving our sandbox! We recently had a few individuals submit some great issues and suggestions, which we absolutely loved receiving.<p>Happy to answer any questions about software supply chain attacks or security in general!<p>1. <a href="https:&#x2F;&#x2F;blog.phylum.io&#x2F;junes-sophisticated-npm-attack-attributed-to-north-korea&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.phylum.io&#x2F;junes-sophisticated-npm-attack-attrib...</a><p>2. <a href="https:&#x2F;&#x2F;blog.phylum.io&#x2F;rust-malware-staged-on-crates-io&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.phylum.io&#x2F;rust-malware-staged-on-crates-io&#x2F;</a><p>3. <a href="https:&#x2F;&#x2F;blog.phylum.io&#x2F;npm-emails-validator-package-malware&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.phylum.io&#x2F;npm-emails-validator-package-malware&#x2F;</a><p>4. <a href="https:&#x2F;&#x2F;github.com&#x2F;phylum-dev&#x2F;birdcage">https:&#x2F;&#x2F;github.com&#x2F;phylum-dev&#x2F;birdcage</a><p>5. <a href="https:&#x2F;&#x2F;github.com&#x2F;phylum-dev&#x2F;cli">https:&#x2F;&#x2F;github.com&#x2F;phylum-dev&#x2F;cli</a>