House lawmakers move to extend two key cyber programs, for now

The measure from the House Appropriations Committee would extend the life of the 2015 Cybersecurity Information Sharing Act (CISA 2015) and the State and Local Cybersecurity Grant Program — both of which are slated to expire September 30 — until November 21.

The Record from Recorded Future News – ​Read More

YouTube reveals new AI tools for Shorts creators – see what you can do now

Powered by DeepMind’s Veo 3 and Lyria 2 models, the tools promise ‘more play, less effort’ for creators.

Latest news – ​Read More

Hate Windows 11’s vibe? Make it look more like Linux or MacOS – here’s how

This free and fully customizable desktop environment enhances Windows every which way.

Latest news – ​Read More

Responding to npm package compromise by the Shai-Hulud worm.

On the evening of September 15, a new attack against the most popular JavaScript component npm began.  A number of packages some with millions of weekly downloads were infected with malicious code that steals tokens and authentication keys. Its most interesting feature is that it is able to spread automatically infecting other nmp packages. Among the infected packages is the popular @ctrl/tinycolor. According to Aikido Security, almost 150 packages have been compromised including Crowdstrike packages.

Propagation methodology

The method of the first infection and “patient zero” are currently unknown. Since the attack pattern is very similar to the recent s1ngularity incident, it may have been phishing as well. But the further chain of infection is as follows:

  • Malicious code is added to compromised packages in the form of a post-installation script saved in the bundle.js file. When the victim installs the infected package, the script runs. Unlike the previous incident, the script is cross-platform and works in both *nix and Windows environments.
  • The script downloads a platform-appropriate version of TruffleHog, a legitimate secret-finding tool. TruffleHog finds high-entropy strings in local file systems and available repositories. These are cryptographic keys, API tokens, and other such information.
  • In addition to searching through TruffleHog, the script validates useful tokens by analyzing environment variables such as GITHUB_TOKEN, NPM_TOKEN, AWS_ACCESS_KEY_ID, and AWS_SECRET_ACCESS_KEY. It then checks if they are valid by querying the npm whoami and GitHub user API-endpoints.
  • The script then compromises npm packages to which the attacked user has access with publishing rights. To do this, it downloads the current version of the infected package from npm, increments the subversion by 1, adds a link to the postinstall hook, and writes its copy to the bundle.js file. Then the trojanized “new version” of the package is published to npm.
  • Then it marks the victim’s repositories as public ones, which is sometimes a separate, more important leak.

Publishing stolen data

Extracting the harvested secrets is done in two ways at the same time:

Through the GitHub repository. Malware creates a public Shai-Hulud repository on behalf of the victim and with their GitHub token. Then it uploads a JSON file with the collected secrets and system information to this repository.

Via GitHub actions. The script creates a new GitHub workflow (github/workflows/shai-hulud-workflow.yml) that encodes the collected secrets into JSON and transmits to the attacker’s webhook[.]site server.

Incident Response

The infection of the tinycolor package and dozens of others became known on the night of September 15-16, and by morning the npm administration had already started to respond by rolling back the infected packages to their clean versions. The history of processed packages does not show the malicious version at all, but the fact that it existed can be found in GitHub bulletins. Judging by the fact that there’ve been no new bulletins for five hours at the time of writing, the large-scale incident could be considered over. But given that we’re dealing with a worm, it could start all over again unless npm blocks the publication of specific malicious files.

Those who managed to download the infected packages are advised to:

  • rollback to safe versions of packages, and clearing the npm cache;
  • audit CI/CD Pipeline and developer computers for unauthorized changes;
  • analyze logs to identify suspicious accesses to npm publish;
  • replace all NPM, GitHub, AWS, GCP and Azure keys and tokens that were available in the affected environment.

Kaspersky solutions detect this threat with the verdict Worm.Script.Shulud.*. The most complete list of affected packages can be found on GitHub.

Kaspersky official blog – ​Read More

AirPods Pro 3 fitness feature surprises triathlete tester – here’s what he found

This new feature in the AirPods Pro 3 is a winner, according to the DC Rainmaker blog.

Latest news – ​Read More

Deploying agentic AI? You’ll probably do business with these 3 companies

How three major players position themselves to define enterprise productivity tools, according to Research And Markets.

Latest news – ​Read More

Copilot Chat arrives free for Microsoft 365 users – check if you have it

Here’s what you’ll need to fully access Copilot Chat.

Latest news – ​Read More

How to Set Up and Use a Burner Phone

Obtaining and using a true burner phone is hard—but not impossible. Here are the steps you need to take to protect your mobile communications based on the risks you face.

Security Latest – ​Read More

Some Pixel 7 users say their batteries are swelling – what Google is doing about it

The Pixel and Pixel 7 Pro are the latest Google phones with battery problems.

Latest news – ​Read More

Don’t like Apple’s new Liquid Glass look? Here’s how to tone it down

You can’t disable Liquid Glass but you can reduce its effects. Here’s how to do this on an iPhone, iPad, Mac, and Apple Watch.

Latest news – ​Read More