Open-source supply-chain attack steals credentials via poisoned package

1 min read
Source: Ars Technica
Open-source supply-chain attack steals credentials via poisoned package
Photo: Ars Technica
TL;DR Summary

Attackers exploited a GitHub Actions workflow to gain access to signing keys and credentials, publishing a malicious element-data 0.23.3 package that scanned environments for sensitive data; the package was removed within ~12 hours, credentials rotated, and users are urged to upgrade to 0.23.4, purge caches, and rotate any exposed secrets.

Share this article

Reading Insights

Total Reads

0

Unique Readers

3

Time Saved

4 min

vs 5 min read

Condensed

94%

88250 words

Want the full story? Read the original article

Read on Ars Technica