As Costa found out, malicious code checked in which environment the library is located – in test or production. If in production, the code downloaded from Pastebin an additional malicious module that serves as a backdoor in applications or on web sites that use the strong_password library.
The backdoor sent the URL of each infected site to smiley.zzz.com.ua, and waited for instructions that it received in the form of packed cookies.“In a loop within a new thread, after waiting for a random number of seconds up to about an hour, it fetches and runs the code stored in a pastebin.com, only if running in production, with an empty exception handling that ignores any error it may raise”, — reported Tute Costa.
Having discovered the problem, Costa made an attempt to contact the real owner of the library, but it turned out that the developer’s RubyGems account was intercepted by an intruder. In this account, the hacker posted a malicious version of “strong_password” 0.0.7, containing a backdoor. According to RubyGems statistics, the malicious version was downloaded 537 times.
Costa told the owner of the library and the RubyGems security service about the find. The malicious version was removed from the repository within a week after the download.
A similar incident happened in April of this year, when a hacker crashed into the Bootstrap-Sass Ruby library with an almost identical backdoor deployment mechanism.
About Kabatibly.co.in Kabatibly.co.in pop-ups can not introduce out of nowhere. If you have clicked some…
About Reditarcet.co.in Reditarcet.co.in pop-ups can not introduce out of the blue. If you have clicked…
About Everestpeak.top Everestpeak.top pop-ups can not open out of the blue. If you have actually…
About Firm-jawed.yachts Firm-jawed.yachts pop-ups can not launch out of nowhere. If you have clicked some…
About Anapurnatop.top Anapurnatop.top pop-ups can not expose out of nowhere. If you have clicked on…
About Boomira.com Boomira.com pop-ups can not open out of nowhere. If you have clicked on…