Code Supply Chain Compromise

It is a while since I have written about the issue of compromising code in software repositories being an attack vestor for threat actor bit it has not gone away.

Malicious Microsoft VSCode extensions steal passwords, open remote shells (bleepingcomputer.com)

Software and web developers everywhere will access code from these depositories to include in their own projects – it is a legitimate way to build modern applications and has many advantages. But the one disadvantage is that threat actors have found ways to access and infect legitimate or even offer their own compromised code to developers. The reach of such a cyber-attack is great if the code infected is popular.

Your takeaway is to run due diligence on anyone – software developer or web designer – who works for you and check what cyber security management they have in place for plug-ins and third-party code.

Clive Catton MSc (Cyber Security) – by-line and other articles

Further Reading

How much are you relying on your web designer to protect your reputation? – CyberAwake