Security researcher hacks Apple in clever open source attack | #macos | #macsecurity | #cybersecurity | #infosecurity | #hacker

A security researcher found a clever way to hack Apple, Tesla, and more than 30 other major companies using a novel open-source software approach.

Microsoft, PayPal, Shopify, Netflix, Yelp, and Uber were among the other companies that found their internal systems breached in the proof of concept …

The imaginative approach exploited the fact that the systems of many major companies pull in open-source software from public repositories. Bleeping Computer explains:

The attack comprised uploading malware to open source repositories including PyPI, npm, and RubyGems, which then got distributed downstream automatically into the company’s internal applications.

Unlike traditional typosquatting attacks that rely on social engineering tactics or the victim misspelling a package name, this particular supply chain attack is more sophisticated as it needed no action by the victim, who automatically received the malicious packages. This is because the attack leveraged a unique design flaw of the open-source ecosystems called dependency confusion […]

Last year, security researcher Alex Birsan came across an idea when working with another researcher Justin Gardner. Gardner had shared with Birsan a manifest file, package.json, from an npm package used internally by PayPal.

Birsan noticed some of the manifest file packages were not present on the public npm repository but were instead PayPal’s privately created npm packages, used and stored internally by the company.

On seeing this, the researcher wondered, should a package by the same name exist in the public npm repository, in addition to a private NodeJS repository, which one would get priority?

He soon found the answer: The public packages took priority, so simply uploading fake ones with the same names led to them being automatically downloaded. In some cases, he had to add later version numbers to trigger a download.

The full write-up is worth reading, explaining how Birsan was able to prove that the packages had been installed without triggering any alerts.

Of course, the fake packages were harmless, and Birsan alerted the companies as soon as he got confirmation of a successful infiltration. He received over $130K in bug bounties, with Apple confirming that he will be rewarded by them.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Original Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App







National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.