In Ruby password checking library discovered a backdoor

Developer Tute Costa found a backdoor in the Ruby library “strong_password”, with which attackers could execute any code in applications containing this library.

As Costa found out, malicious code checked in which environment the library is located – in test or production. If in production, the code downloaded from Pastebin an additional malicious module that serves as a backdoor in applications or on web sites that use the strong_password library.

“In a loop within a new thread, after waiting for a random number of seconds up to about an hour, it fetches and runs the code stored in a, only if running in production, with an empty exception handling that ignores any error it may raise”, — reported Tute Costa.

Tute Costa
Tute Costa
The backdoor sent the URL of each infected site to, and waited for instructions that it received in the form of packed cookies.

Having discovered the problem, Costa made an attempt to contact the real owner of the library, but it turned out that the developer’s RubyGems account was intercepted by an intruder. In this account, the hacker posted a malicious version of “strong_password” 0.0.7, containing a backdoor. According to RubyGems statistics, the malicious version was downloaded 537 times.

Costa told the owner of the library and the RubyGems security service about the find. The malicious version was removed from the repository within a week after the download.

A similar incident happened in April of this year, when a hacker crashed into the Bootstrap-Sass Ruby library with an almost identical backdoor deployment mechanism.

[Total: 0    Average: 0/5]
READ  Gwmndy botnet turns Fiberhome routers into nodes for SSH tunneling

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

MageCart on the Heroku Cloud Platform

Researchers Found Several MageCart Web Skimmers On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform …

Android Spyware CallerSpy

CallerSpy spyware masks as an Android chat application

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, …

Leave a Reply