Trojanized JQuery Packages Spread via ‘Complex’ Supply Chain Attack

Trojanized JQuery Packages Spread via 'Complex' Supply Chain Attack

July 9, 2024 at 12:13PM

Cyberattackers are targeting JavaScript developers with a supply chain attack distributing Trojanized jQuery packages across GitHub, npm, and jsDelivr repositories. The attackers exhibit an unusual lack of nomenclature and attribution, with a manual assembly and publication of each package. The attack, requiring specific user actions to trigger, emphasizes the need for heightened vigilance within developer communities and organizations.

From the meeting notes, I have gathered that there is a targeted supply chain attack happening, where cyberattackers are distributing Trojanized packages for the jQuery JavaScript library across various popular repositories like GitHub, npm, and jsDelivr. These packages contain modified versions of jQuery with additional malicious code designed to extract website form data. The attackers are deliberately trying to blend in by using new usernames and creating unique exfiltration URLs for each package.

The attack is unique in that it appears to be a manual effort, possibly targeting developers who use the jQuery library. The Phylum Research Team suggests that the malware within the packages requires specific user actions to be triggered, and while the conditions for triggering the malware seem narrow, the broad distribution of the packages means that it could potentially impact many unsuspecting developers.

This growing trend of supply chain attacks involving code repositories highlights the need for heightened vigilance within the open source community and organizations. To mitigate the risk, organizations are encouraged to scan any code used in development projects before distribution. Additionally, the Phylum researchers have provided a list of the malicious package names, publication dates, associated usernames, and related domains to help developers avoid installing these packages.

Overall, it is crucial for developers and organizations to be vigilant and to take proactive measures to prevent the installation of these malicious packages and protect against potential supply chain threats.

Full Article