GitLab Continuous Integration pipelines are being targeted in a new software supply chain attack dubbed CrateDepression, which involves malware deployment, reports SecurityWeek.
SentinelLabs researchers have discovered that threat actors behind CrateDepression have leveraged both typosquatting and Rust developer spoofing to facilitate malicious crate promotion on Rust.
Despite the prompt removal of the malicious crate, more widespread supply-chain attacks have been enabled by a second-stage GitHub CI pipeline payload. The technical report also showed that the second-stage payload featured screenshot and keyboard stroke capturing, as well as file uploading and downloading capabilities.
"While the ultimate intent of the attacker(s) is unknown, the intended targeting could lead to subsequent larger scale supply-chain attacks depending on the GitLab CI pipelines infected... Software supply-chain attacks have gone from a rare occurrence to a highly desirable approach for attackers to 'fish with dynamite' in an attempt to infect entire user populations at once," said SentinelLabs.
Risk Assessments/Management, Breach, Critical Infrastructure Security
GitLab CI pipelines subjected to software supply chain attack
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds