{"id":21837,"date":"2025-09-20T21:42:49","date_gmt":"2025-09-20T21:42:49","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=21837"},"modified":"2025-09-20T21:42:49","modified_gmt":"2025-09-20T21:42:49","slug":"a-dangerous-worm-is-eating-its-way-through-software-packages","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=21837","title":{"rendered":"A Dangerous Worm Is Eating Its Way Through Software Packages"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"lead-in-text-callout\">New findings this<\/span> week confirmed that <a href=\"https:\/\/www.wired.com\/story\/a-dhs-data-hub-exposed-sensitive-intel-to-thousands-of-unauthorized-users\/\">a misconfigured platform used by the Department of Homeland Security<\/a> left delicate nationwide safety data\u2014together with information associated to the surveillance of People\u2014uncovered and accessible to hundreds of individuals. In the meantime, 15 New York officers <a href=\"https:\/\/www.wired.com\/story\/ice-mass-arrests-new-york-officials\/\">were arrested by Immigration and Customs Enforcement and the New York Police Department this week in or around 26 Federal Plaza<\/a>\u2014the place ICE detains folks in what courts have dominated are unsanitary circumstances.<\/p>\n<p class=\"paywall\">Russia carried out conspicuous <a href=\"https:\/\/www.wired.com\/story\/russia-hypersonic-missile-test-nato-borders\/\">military exercises testing hypersonic missiles<\/a> close to NATO borders, stoking tensions within the area after the Kremlin had already not too long ago flown drones into Polish and Romanian airspace. Scammers have a <a href=\"https:\/\/www.wired.com\/story\/sms-blasters-scam-texts\/\">new tool for sending spam texts, known as \u201cSMS blasters<\/a>,\u201d that may ship as much as 100,000 texts per hour whereas evading telecom firm anti-spam measures. Scammers deploy rogues cell towers that trick folks&#8217;s telephones into connecting to the malicious units to allow them to ship the texts straight and bypass filters. And a pair of flaws in Microsoft&#8217;s Entra ID id and entry administration system, which have been patched, <a href=\"https:\/\/www.wired.com\/story\/microsoft-entra-id-vulnerability-digital-catastrophe\/\">could have been exploited to access virtually all Azure customer accounts<\/a>\u2014a probably catastrophic catastrophe.<\/p>\n<p class=\"paywall\">WIRED printed a <a href=\"https:\/\/www.wired.com\/story\/how-to-set-up-use-burner-phone\/\">detailed guide this week to acquiring and using a burner phone<\/a>, in addition to options which can be extra non-public than a daily cellphone however not as labor-intensive as a real burner. And we up to date our <a href=\"https:\/\/www.wired.com\/gallery\/best-vpn\/\">guide to the best VPNs<\/a><\/p>\n<p class=\"paywall\">However wait, there\u2019s extra! Every week, we spherical up the safety and privateness information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the total tales. And keep protected on the market.<\/p>\n<p class=\"paywall\">The cybersecurity world has seen, to its rising dismay, loads of <a href=\"https:\/\/www.wired.com\/story\/hacker-lexicon-what-is-a-supply-chain-attack\/\">software supply chain attacks<\/a>, through which hackers disguise their code in a official piece of software program in order that it\u2019s silently seeded out to each system that makes use of that code world wide. In recent times, hackers have even tried linking <a href=\"https:\/\/www.wired.com\/story\/3cx-supply-chain-attack-times-two\/\">one software supply chain attack to another<\/a>, discovering a second software program developer goal amongst their victims to compromise one more piece of software program and launch a brand new spherical of infections. This week noticed a brand new and troubling evolution of these ways: A full-blown self-replicating provide chain assault worm.<\/p>\n<p class=\"paywall\">The malware, which has been dubbed Shai-Hulud after the Fremen identify for the monstrous Sandworms within the sci-fi novel <em>Dune<\/em> (and the identify of the Github web page the place the malware printed stolen credentials of its victims) has compromised lots of of open-source software program packages on the code repository Node Packet Administration, or NPM, utilized by builders of Javascript. The Shai-Hulud worm is designed to contaminate a system that makes use of a type of software program packages, then hunt for extra NPM credentials on that system in order that it will probably corrupt one other software program package deal and proceed its unfold.<\/p>\n<p class=\"paywall\">By one depend, the worm has unfold to <a data-offer-url=\"https:\/\/krebsonsecurity.com\/2025\/09\/self-replicating-worm-hits-180-software-packages\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/krebsonsecurity.com\/2025\/09\/self-replicating-worm-hits-180-software-packages\/&quot;}\" href=\"https:\/\/krebsonsecurity.com\/2025\/09\/self-replicating-worm-hits-180-software-packages\/\" rel=\"nofollow noopener\" target=\"_blank\">more than 180 software packages<\/a>, together with 25 utilized by the cybersecurity agency CrowdStrike, although CrowdStrike has since had them faraway from the NPM repository. One other depend from cybersecurity agency ReversingLabs put the depend far larger, at <a data-offer-url=\"https:\/\/www.darkreading.com\/application-security\/self-replicating-shai-hulud-worm-npm-packages\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.darkreading.com\/application-security\/self-replicating-shai-hulud-worm-npm-packages&quot;}\" href=\"https:\/\/www.darkreading.com\/application-security\/self-replicating-shai-hulud-worm-npm-packages\" rel=\"nofollow noopener\" target=\"_blank\">more than 700 affected code packages<\/a>. That makes Shai-Hulud one of many greatest provide chain assaults in historical past, although the intent of its mass credential-stealing stays removed from clear.<\/p>\n<p class=\"paywall\">Western privateness advocates have lengthy pointed to China\u2019s surveillance methods because the potential dystopia awaiting nations like the US if tech trade and authorities information assortment goes unchecked. However a sprawling Related Press investigation highlights how China\u2019s surveillance methods have reportedly been largely constructed on US applied sciences. The AP\u2019s reporters discovered proof that China\u2019s surveillance community\u2014from the \u201cGolden Defend\u201d policing system that Beijing officers have used to censor the web and crack down on alleged terrorists to the instruments used to focus on, monitor and infrequently detain Uyghurs and the nation\u2019s Xinjiang area\u2014seem to have been constructed with the assistance of American corporations, together with IBM, Dell, Cisco, Intel, Nvidia, Oracle, Microsoft, Thermo Fisher, Motorola, Amazon Net Providers, Western Digital, and HP. In lots of instances, the AP discovered Chinese language-language advertising and marketing supplies through which the Western corporations particularly providing surveillance functions and instruments to Chinese language police and home intelligence companies.<\/p>\n<p class=\"paywall\">Scattered Spider, a uncommon hacking and extortion cybercriminal gang based mostly largely in Western nations, has for years unleashed a path of chaos throughout the web, hitting targets from MGM Resorts and Caesar\u2019s Palace to the Marks &amp; Spencer grocery chain in the UK. Now two alleged members of that infamous group have been arrested within the UK: 19-year-old Thalha Jubair and 18-year-old Owen Flowers, each charged with hacking the Transport for London transit system\u2014reportedly inflicting greater than $50 million in harm\u2014amongst many different targets. Jubair alone is accused of intrusions focusing on 47 organizations. The arrests are simply the newest in a string of busts focusing on Scattered Spider, which has nonetheless continued a virtually uninterrupted string of breaches. Noah City, who was convicted on expenses associated to Scattered Spider exercise, spoke from jail to Bloomberg Businessweek for a <a data-offer-url=\"https:\/\/www.bloomberg.com\/news\/features\/2025-09-19\/multimillion-dollar-hacking-spree-scattered-spider-teen-s-jailhouse-confessions?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1ODI4MTkwMSwiZXhwIjoxNzU4ODg2NzAxLCJhcnRpY2xlSWQiOiJUMlUyTVNHUTFZWVUwMCIsImJjb25uZWN0SWQiOiIwNUVDNUJDRTNFOTA0ODQ0OThBOTc5MkM0MDIwNkUzNyJ9.hZarEq-EdSn6zXTfZnJEI870hLN66BhFQhLN7kqmKds&amp;leadSource=uverify%20wall\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bloomberg.com\/news\/features\/2025-09-19\/multimillion-dollar-hacking-spree-scattered-spider-teen-s-jailhouse-confessions?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1ODI4MTkwMSwiZXhwIjoxNzU4ODg2NzAxLCJhcnRpY2xlSWQiOiJUMlUyTVNHUTFZWVUwMCIsImJjb25uZWN0SWQiOiIwNUVDNUJDRTNFOTA0ODQ0OThBOTc5MkM0MDIwNkUzNyJ9.hZarEq-EdSn6zXTfZnJEI870hLN66BhFQhLN7kqmKds&amp;leadSource=uverify%20wall&quot;}\" href=\"https:\/\/www.bloomberg.com\/news\/features\/2025-09-19\/multimillion-dollar-hacking-spree-scattered-spider-teen-s-jailhouse-confessions?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1ODI4MTkwMSwiZXhwIjoxNzU4ODg2NzAxLCJhcnRpY2xlSWQiOiJUMlUyTVNHUTFZWVUwMCIsImJjb25uZWN0SWQiOiIwNUVDNUJDRTNFOTA0ODQ0OThBOTc5MkM0MDIwNkUzNyJ9.hZarEq-EdSn6zXTfZnJEI870hLN66BhFQhLN7kqmKds&amp;leadSource=uverify%20wall\" rel=\"nofollow noopener\" target=\"_blank\">long profile of his cybercriminal career<\/a>. City, 21, has been sentenced to a decade in jail.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/a-dangerous-worm-is-eating-its-way-through-software-packages\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New findings this week confirmed that a misconfigured platform used by the Department of Homeland Security left delicate nationwide safety data\u2014together with information associated to the surveillance of People\u2014uncovered and accessible to hundreds of individuals. In the meantime, 15 New York officers were arrested by Immigration and Customs Enforcement and the New York Police Department [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21839,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[1293,1587,2259,692,3554],"class_list":["post-21837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-dangerous","tag-eating","tag-packages","tag-software","tag-worm"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/21837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21837"}],"version-history":[{"count":1,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/21837\/revisions"}],"predecessor-version":[{"id":21838,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/21837\/revisions\/21838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/21839"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}