Darkpro : Carding Forums - Carders Forums - Best Carding Forums - Hacking Forum - Dread Forum,

Unlock the World of Hassle-Free Money Transfers! šŸŒšŸ’ø Looking for a reliable, fast, and secure way to send money across the globe? Welcome to Darkpro.net, your ultimate hub for worldwide money transfers Like WU, PayPal, Cash App, Moneygram, Zelle and many more worldwide šŸ’¼ Why Choose Us? Global Reach: Transfer funds to over 200 countries effortlessly. Trusted Community: Join thousands of users sharing insights, tips, and trusted services. Exclusive Deals: Stay ahead with updates on the best rates and offers. Donā€™t miss outā€”be part of a thriving Forum of Legit Carding Services that connects you to the world! Sign up and start exploring endless possibilities.






Mr-X

Verified Seller Topic Selling Paypal, Payoneer,Ban
Verified Seller
Staff Member
Premium User
Joined
Jul 16, 2021
Messages
229
Reaction score
13
Points
16
Location
USA
A researcher claims to have hacked into the internal systems of major companies including Apple and Microsoft using a novel supply chain attack.

Alex Biran created malicious node packages and uploaded them to the npm registry under unclaimed names. The node packages collected information through their preinstall script about the machines upon which they were installed.

Next, Biran came up with a way to get the packages to send information back to him.

"Knowing that most of the possible targets would be deep inside well-protected corporate networks, I considered that DNS exfiltration was the way to go," wrote Biran.

The data was hex-encoded and used as part of a DNS query, which reached the researcher's custom authoritative name server, either directly or through intermediate resolvers. Biran then found private package names inside JavaScript files.

"Apple, Yelp, and Tesla are just a few examples of companies who had internal names exposed in this way," Biran wrote.

In the latter half of 2020, Biran scanned millions of domains belonging to targeted companies and extracted hundreds of JavaScript package names that hadn't been claimed on the npm registry. He uploaded his malicious code to the package-hosting services and achieved a success rate that he described as "simply astonishing."

"Squatting valid internal package names was a nearly sure-fire method to get into the networks of some of the biggest tech companies out there, gaining remote code execution, and possibly allowing attackers to add backdoors during builds," said Biran.

"This type of vulnerability, which I have started calling dependency confusion, was detected inside more than 35 organizations to date, across all three tested programming languages."

The vast majority of affected companies employed over a thousand people.

ā€œThis is an incredibly serious industry-wide problem," Craig Young, principal security researcher at Tripwire, told Infosecurity Magazine.

"When software development firms allow their employees to download and start working with arbitrary coding modules from public repositories, they are exposing themselves to both security and legal risks. In this case, it was a researcher with an innocuous ā€˜phone homeā€™ payload, but it could have just as easily been an APT deploying a malware implant or a patent troll deploying a commercially licensed algorithm.ā€
 
Top