DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers (2402.18401v3)
Abstract: The Software Supply Chain (SSC) has captured considerable attention from attackers seeking to infiltrate systems and undermine organizations. There is evidence indicating that adversaries utilize Social Engineering (SocE) techniques specifically aimed at software developers. That is, they interact with developers at critical steps in the Software Development Life Cycle (SDLC), such as accessing Github repositories, incorporating code dependencies, and obtaining approval for Pull Requests (PR) to introduce malicious code. This paper aims to comprehensively explore the existing and emerging SocE tactics employed by adversaries to trick Software Engineers (SWEs) into delivering malicious software. By analyzing a diverse range of resources, which encompass established academic literature and real-world incidents, the paper systematically presents an overview of these manipulative strategies within the realm of the SSC. Such insights prove highly beneficial for threat modeling and security gap analysis.
- “HackTask,” https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/2017/hacktask.md, 2017, [Online; accessed 13-August-2023].
- “CCleaner Attack Timeline—Here’s How Hackers Infected 2.3 Million PCs,” https://thehackernews.com/2018/04/ccleaner-malware-attack.html, 2018, [Online; accessed 27-June-2023].
- “Colourama,” https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/2018/colourama.md, 2018, [Online; accessed 13-August-2023].
- “Details about the event-stream incident,” https://blog.npmjs.org/post/180565383195/details-about-the-event-stream-incident , 2018, [Online; accessed 13-August-2023].
- (2018) Statcounter analytics code hijacked to steal bitcoins from cryptocurrency users. [Online]. Available: https://thehackernews.com/2018/11/statcounter-cryptocurrency-cyberattack.html
- “The event-stream vulnerability,” https://github.com/cncf/tag-security/blob/main/, 2018, [Online; accessed 13-August-2023].
- “Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem,” https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/, 2019, [Online; accessed 13-August-2023].
- “Plot to steal cryptocurrency foiled by the npm security team,” https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm, 2019, [Online; accessed 13-August-2023].
- “SIMBAD: A ROGUE ADWARE CAMPAIGN ON GOOGLE PLAY,” https://research.checkpoint.com/2019/simbad-a-rogue-adware-campaign-on-google-play/, 2019, [Online; accessed 13-August-2023].
- “Why npm lockfiles can be a security blindspot for injecting malicious modules,” https://snyk.io/blog/why-npm-lockfiles-can-be-a-security-blindspot-for-injecting-malicious-modules/, 2019, [Online; accessed 13-August-2023].
- “XCodeGhost,” https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/2015/xcodeghost.md, 2019, [Online; accessed 13-August-2023].
- “Four npm packages found uploading user details on a GitHub page,” https://www.zdnet.com/article/four-npm-packages-found-uploading-user-details-on-a-github-page/, 2020, [Online; accessed 13-August-2023].
- “Malicious npm package opens backdoors on programmers’ computers,” https://www.zdnet.com/article/malicious-npm-package-opens-backdoors-on-programmers-computers/, 2020, [Online; accessed 13-August-2023].
- “Malicious npm packages caught installing remote access trojans,” https://www.zdnet.com/article/malicious-npm-packages-caught-installing-remote-access-trojans/, 2020, [Online; accessed 13-August-2023].
- “Over 700 Malicious Typosquatted Libraries Found On RubyGems Repository,” https://thehackernews.com/2020/04/rubygem-typosquatting-malware.html, 2020, [Online; accessed 13-August-2023].
- “Three npm packages found opening shells on Linux, Windows systems,” https://www.zdnet.com/article/three-npm-packages-found-opening-shells-on-linux-windows-systems/ , 2020, [Online; accessed 13-August-2023].
- “Beware the Package Typosquatting Supply Chain Attack,” https://www.darkreading.com/vulnerabilities-threats/beware-the-package-typosquatting-supply-chain-attack, 2021, [Online; accessed 13-August-2023].
- “Beware the Package Typosquatting Supply Chain Attack,” https://www.thestack.technology/github-supply-chain-attack-clones/, 2021, [Online; accessed 13-August-2023].
- “Compromise of NPM package ua-parser-js,” https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/2021/ua-parser-js.md, 2021, [Online; accessed 13-August-2023].
- “Damaging Linux and Mac Malware Bundled Within Browserify npm Brandjack Attempt,” https://blog.sonatype.com/damaging-linux-mac-malware-bundled-within-browserify-npm-brandjack-attempt, 2021, [Online; accessed 13-August-2023].
- “Finding Evil Go Packages,” https://michenriksen.com/blog/finding-evil-go-packages/, 2021, [Online; accessed 13-August-2023].
- “JFrog Detects Malicious PyPI Packages Stealing Credit Cards and Injecting Code,” https://jfrog.com/blog/malicious-pypi-packages-stealing-credit-cards-injecting-code/, 2021, [Online; accessed 13-August-2023].
- “Kaseya Supply Chain Attack Targeting MSPs to Deliver REvil Ransomware,” https://www.truesec.com/hub/blog/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware, 2021, [Online; accessed 13-August-2023].
- “Malicious Open Source: the cost of using someone else’s code,” https://avleonov.com/2022/05/11/malicious-open-source-the-cost-of-using-someone-elses-code/, 2021, [Online; accessed 13-August-2023].
- “PHP’s Git server hacked to add backdoors to PHP source code,” https://www.bleepingcomputer.com/news/security/phps-git-server-hacked-to-add-backdoors-to-php-source-code/, 2021, [Online; accessed 13-August-2023].
- “Popular Codecov code coverage tool hacked to steal dev credentials,” https://www.bleepingcomputer.com/news/security/popular-codecov-code-coverage-tool-hacked-to-steal-dev-credentials/, 2021, [Online; accessed 13-August-2023].
- “Sonatype Catches New PyPI Cryptomining Malware,” https://blog.sonatype.com/sonatype-catches-new-pypi-cryptomining-malware-via-automated-detection, 2021, [Online; accessed 13-August-2023].
- “Dropbox hacker steals 130 GitHub repositories,” https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/2022/dropbox-github-account-breach.md, 2022, [Online; accessed 13-August-2023].
- “Phishing Campaign Targets PyPI Users to Distribute Malicious Code,” https://www.darkreading.com/cloud/phishing-campaign-targets-pypi-users-to-distribute-malicious-code, 2022, [Online; accessed 13-August-2023].
- “Security alert: new phishing campaign targets GitHub users,” https://github.blog/2022-09-21-security-alert-new-phishing-campaign-targets-github-users/, 2022, [Online; accessed 13-August-2023].
- (2023) 3cx software supply chain compromise initiated by a prior software supply chain compromise; suspected north korean actor responsible. [Online]. Available: https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
- (2023) Common oss supply chain threats. [Online]. Available: https://github.com/ossf/s2c2f/blob/main/specification/framework.md#common-oss-supply-chain-threats
- “Fake zero-day PoC exploits on GitHub push Windows, Linux malware,” https://www.bleepingcomputer.com/news/security/fake-zero-day-poc-exploits-on-github-push-windows-linux-malware/, 2023, [Online; accessed 13-August-2023].
- (2023) Generating provenance statements. [Online]. Available: https://docs.npmjs.com/generating-provenance-statements
- “NPM Package mathjs-min Contains Credential Stealer,” https://github.com/cncf/tag-security/blob/main/supply-chain-security/compromises/2023/mathjs-min.md, 2023, [Online; accessed 13-August-2023].
- (2023) [security update] june 20 incident details and remediation. [Online]. Available: https://jumpcloud.com/blog/security-update-june-20-incident-details-and-remediation
- (2023) Sigstore. [Online]. Available: https://www.sigstore.dev/
- “SolarWinds hack explained: Everything you need to know,” https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know, 2023, [Online; accessed 13-August-2023].
- (2023) Supply chain levels for software artifacts, or slsa (salsa). [Online]. Available: https://slsa.dev
- “Takeaways from the CircleCI Incident,” https://perception-point.io/blog/takeaways-from-the-circleci-incident, 2023, [Online; accessed 13-August-2023].
- D. Gonzalez, T. Zimmermann, P. Godefroid, and M. Schäfer, “Anomalicious: Automated detection of anomalous and potentially malicious commits on github,” in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2021, pp. 258–267.
- R. Hiesgen, M. Nawrocki, T. C. Schmidt, and M. Wählisch, “The race to the vulnerable: Measuring the log4j shell incident,” arXiv preprint arXiv:2205.02544, 2022.
- P. Ladisa, H. Plate, M. Martinez, and O. Barais, “Sok: Taxonomy of attacks on open-source software supply chains,” in 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2023, pp. 1509–1526.
- S. Maple, “Synk security blog,” https://snyk.io/blog/yet-another-malicious-package-found-in-npm-targeting-cryptocurrency-wallets/, 2019, [Online; accessed 26-July-2023].
- M. Ohm, H. Plate, A. Sykosch, and M. Meier, “Backstabber’s knife collection: A review of open source software supply chain attacks,” in Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings 17. Springer, 2020, pp. 23–43.
- M. Verdi, A. Sami, J. Akhondali, F. Khomh, G. Uddin, and A. K. Motlagh, “An empirical study of c++ vulnerabilities in crowd-sourced code examples,” IEEE Transactions on Software Engineering, vol. 48, no. 5, pp. 1497–1514, 2020.
- Q. Wu and K. Lu, “On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits,” Proc. Oakland, 2021.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.