Transcript
A (0:00)
Foreign and welcome to Risky Business. My name's Patrick Gray. We'll be chatting with Adam Boileau in just a moment about all of the week's cyber security news. And then in this week's sponsor interview, we're going to hear from Adam Poynton, who is the chief executive of Knock Knock. And yeah, we're going to be talking to him about how many people are applying Knock Knock's network controls to internal networks. So, so there are people using it to do external attack surface reduction, but the internal use case has really taken off, frankly, to a surprising degree. That conversation is coming up later. But first up, Adam, we are going to start off this week's show by talking about Shaylud, the beloved sandworm of the desert.
B (0:49)
Yes, Brian Krebs has a write up of this attack against the NPM package repository. So some people have uploaded like a self replicating, credential, thieving worm to npm. So if you're a package maintainer and you get infected, like you run a piece of this, you run JavaScript that's infected by the software, it will rummage around your system, find whatever credentials you've got, publish them off to the web somewhere for the attacker to retrieve. But if you have a token for NPM and you have some packages that you maintain, it will download those packages, insert itself into them, repackage them, and then publish them for everybody else. So, yeah, that's an honest to God. It's an honest to God Internet worm, which, you know, hell yeah, it's been.
A (1:37)
A while since we've seen like the savvy worm or something. But it's npm. You neglected one important detail here, which is what it does with the secrets when it finds them. So it uses Truffle Hog to actually find the secrets and then it actually spins up GitHub public repo for that developer and just dumps the secrets in it for the entire world to see.
B (1:59)
Which, why not, right? Why not? And it's kind of a good way of laundering them, I suppose, because you're not directly linked to it. So that's, I guess, kind of smart in a way. A little chaotic, but smart.
A (2:13)
Yeah. Well, I mean, last week we were talking about, well, what could they have done differently? In fact, I woke up this morning to a message from someone saying, can you please stop giving these guys tips, right? Giving them ideas about how to do better, get persistence and stuff. Because that was a big part of the discussion last week. But I mean, you know, this is, I mean, it's still, it Ain't subtle, right? Like this. This ain't subtle. And you do wonder how far they're going to get, like doing something like this if they're actually going to manage to rack off with some crypto. Because I believe it's actually the same people who were talking about last week that had just done a more manual supply chain attack against npm.
