I-Malware Ijovwe Kuphakheji ye-UAParser.js NPM enokulanda okungu-8M ngeviki

Indaba yokukhishwa endaweni ye-NPM yamaphakheji anonya amathathu akopishe ikhodi yelabhulali ye-UAParser.js ithole ukuqhubeka okungalindelekile - abahlaseli abangaziwa babambe ukulawula kwe-akhawunti yombhali wephrojekthi ye-UAParser.js futhi bakhipha izibuyekezo eziqukethe ikhodi ukweba amaphasiwedi kanye nezimayini cryptocurrencies.

Inkinga ukuthi umtapo wezincwadi we-UAParser.js, ohlinzeka ngemisebenzi yokudlulisa isihloko se-HTTP somenzeli womsebenzisi, unokulandwa okulinganiselwa ezigidini ezingu-8 ngeviki futhi isetshenziswa njengokuncika kumaphrojekthi angaphezu kuka-1200. Kuthiwa i-UAParser.js isetshenziswa kumaphrojekthi ezinkampani ezinjengeMicrosoft, Amazon, Facebook, Slack, Discord, Mozilla, Apple, ProtonMail, Autodesk, Reddit, Vimeo, Uber, Dell, IBM, Siemens, Oracle, HP kanye neVerison. .

Lokhu kuhlasela kwenziwe ngokugetshengwa kwe-akhawunti yomthuthukisi wephrojekthi, obone ukuthi kukhona okungahambi kahle ngemuva kokuthi igagasi elingajwayelekile likagaxekile liwele ebhokisini lakhe leposi. Ukuthi i-akhawunti kanjiniyela igqekezwe kanjani akubikwa. Abahlaseli badale ukukhishwa okungu-0.7.29, 0.8.0 no-1.0.0, bethula ikhodi enonya kubo. Emahoreni ambalwa, abathuthukisi baphinde balawula iphrojekthi futhi badala izibuyekezo ezingu-0.7.30, 0.8.1 kanye no-1.0.1 ukuze kulungiswe inkinga. Izinguqulo ezinonya zishicilelwe kuphela njengamaphakheji endaweni ye-NPM. Inqolobane ye-Git yephrojekthi ku-GitHub ayizange ithinteke. Bonke abasebenzisi abafake izinguqulo eziyinkinga, uma bethola ifayela le-jsextension ku-Linux/macOS, kanye namafayela e-jsextension.exe kanye ne-creement.dll ku-Windows, bayelulekwa ukuthi bacabangele isistimu njengesengozini.

Izinguquko ezinonya ezengezwe bezikhumbuza izinguquko ezihlongozwe ngaphambilini kuma-clones we-UAParser.js, okubonakala sengathi ikhishwe ukuze ihlole ukusebenza ngaphambi kokuqalisa ukuhlasela okukhulu kwephrojekthi enkulu. Ifayela elisebenzisekayo le-jsextension lalayishwa ladawuniloda lafakwa ohlelweni lomsebenzisi lisuka kumsingathi wangaphandle, elikhethwe kuye ngenkundla yomsebenzisi nomsebenzi osekelwayo ku-Linux, macOS kanye neWindows. Okwenkundla yeWindows, ngaphezu kohlelo lokumba i-cryptocurrency ye-Monero (kwasetshenziswa umvukuzi we-XMRig), abahlaseli baphinde bahlela ukwethulwa komtapo wezincwadi we-creative.dll ukuze babambe amaphasiwedi futhi bawathumele kumsingathi wangaphandle.

Ikhodi yokudawuniloda yengezwe efayeleni preinstall.sh, lapho kufakwe khona i-IP=$(curl -k https://freegeoip.app/xml/ | grep 'RU|UA|BY|KZ') uma [ -z " $ IP" ] ... landa bese usebenzisa ifayela elisebenzisekayo fi

Njengoba kungabonwa kukhodi, iskripthi siqale sahlola ikheli le-IP kusevisi ye-freegeoip.app futhi ayizange iqalise uhlelo olunonya lwabasebenzisi abavela e-Russia, Ukraine, Belarus nase-Kazakhstan.

Source: opennet.ru

Engeza amazwana