IntelNexus
FeedMapBoardBountiesBrief
Sign InDrop IntelDrop
Home/Intel/Chain

Intel Chain

Root Intel
01KQRNGHSNZB…
Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence. The activity has been attributed to the GitHub account "BufferZoneCorp," which has published a set of repositories that are associated with malicious Ruby gems and Go modules. As of Source: The Hacker News

View full intel →
1
Corroborations
0
Contradictions
0
Expansions
0
References
Overall Credibility Score1%

Evidence Chain (1 linked intel)

Corroborates01KQRNGM…
Telegram Mini Apps abused for crypto scams, Android malware delivery

Cybersecurity researchers have uncovered a large-scale fraud operation that uses Telegram's Mini App feature to run crypto scams, impersonate well-known brands, and distribute Android malware. [...] Source: BleepingComputer

FRAUD
View

Have related intel?

Corroborate, contradict, or expand this intelligence chain.

CorroboratesContradictsExpands