BTC $81,715 ▼ 0.835% ETH $2,339 ▼ 1.784% BNB $669 ▲ 0.5% SOL $97 ▲ 0.996% BTC $81,715 ▼ 0.835% ETH $2,339 ▼ 1.784% BNB $669 ▲ 0.5% SOL $97 ▲ 0.996%
Альткоины

Атака на цепочку поставок затронула релизы Axios в npm, пользователям рекомендуют ротировать ключи

Security companies flagged axios@1.14.1 and 0.30.4 as compromised, urging credential rotation and rollback of affected packages.

Two malicious Axios npm releases have prompted warnings for developers to rotate credentials and treat affected systems as compromised after a supply chain attack poisoned the popular JavaScript HTTP client library.

The compromise was first reported by cybersecurity company Socket, whichsaidaxios@1.14.1 and axios@0.30.4 were modified to pull in plain-crypto-js@4.2.1, a malicious dependency that ran automatically during installation before the releases were removed from npm.

Accordingto security company OX Security, the altered code can give attackers remote access to infected devices, allowing them to steal sensitive data such as login credentials, API keys and crypto wallet information.

The incident shows how a single compromised open-source component can potentially ripple across thousands of applications that rely on it, exposing not just developers but also platforms and users connected to the system.

OX Security warned developers who installed axios@1.14.1 or axios@0.30.4 to treat their systems as fully compromised and immediately rotate credentials, including API keys and session tokens.

Socket said the compromised Axios releases were modified to include a dependency on plain-crypto-js@4.2.1, a package published shortly before the incident and later identified as malicious.

Related:Trust Wallet browser extension knocked offline by Chrome Store ‘bug,’ CEO says The company said the dependency was configured to run automatically during installation through a post-install script, allowing attackers to execute code on target systems without additional user interaction.

Socket advised developers to review their projects and dependency files for the affected Axios versions and the associated plain-crypto-js@4.2.1 package, and to remove or roll back any compromised versions immediately.

Earlier crypto incidents have shown how supply chain breaches can escalate from stolen developer information to user-facing wallet losses.

On Jan. 3, onchain investigator ZachXBTreported that “hundreds” of walletsacross Ethereum Virtual Machine-compatible networks were drained in a broad attack that siphoned small amounts from each victim.

Cybersecurity researcher Vladimir S. said the incident was potentially linked to a December breach affecting Trust Wallet, which resulted in roughly $7 million in losses across over 2,500 wallets.

Trust Wallet later said the breach may have originated from asupply chain compromiseinvolving npm packages used in its development workflow.

Magazine:Nobody knows if quantum secure cryptography will even work


По материалам CoinTelegraph

Стэндарт Чартерд заявляет, что более быстрый оборот… В Standard Chartered зафиксировали двукратное ускорение оборота…