Here's a New Tool That Scans for Malicious Packages in Open-Source Repositories
https://thehackernews.com/2022/05/heres-new-tool-that-scans-for-malicious.ht... The Open Source Security Foundation (OpenSSF) has announced the initial prototype release of a new tool that's capable of carrying out dynamic analysis of all packages uploaded to popular open source repositories. Called the Package Analysis project, the initiative aims to secure open-source packages by detecting and alerting users to any malicious behavior with the goal of bolstering the security of the software supply chain and increasing trust in open-source software. "The Package Analysis project seeks to understand the behavior and capabilities of packages available on open source repositories: what files do they access, what addresses do they connect to, and what commands do they run?," the OpenSSF said. "The project also tracks changes in how packages behave over time, to identify when previously safe software begins acting suspiciously," the foundation's Caleb Brown and David A. Wheeler added. In a test run that lasted a month, the tool identified more than 200 malicious packages uploaded to PyPI and NPM, with a majority of the rogue libraries leveraging dependency confusion and typosquatting attacks.
This is great. Modern tech provides for doing much more than this, and approaches have been around for decades, but accessibility and utility of behavior scanning has been very stagnant. I'm sure most hackers have spent time making IDS and such of their own. It hasn't been commonplace to have a free public suite that analyses what code does, rather than what it is. Hence articles like this are a great inspiration. The summary below describes analysis of only pypi and npm packages, not mainstream operating system packages, unfortunately. In my opinion, some of these things are described approached in an unideal direction: detection of dependency confusion and typosquatting (the publication of packages with very similar names to mainstream ones, to co-opt users and imports) seems more important than detection of malicious behavior. This is because malicious behavior can get incredibly obscure as malicious actors respond to detection of it. The more obscure it is, the more dangerous it is. This has been seen in the past, with scores of handmade mutating viruses that disguise their traffic, etc. However, we have the technology now to detect obscure malicious behavior: if we make an environment that ensures we learn it exists. The advantage of the malicious behavior detection is that it shows the dependency confusion patterns in use. Let us now use that dependency confusion to learn what novel malicious behaviors exist.
participants (2)
-
jim bell
-
Undiscussed Horrific Abuse, One Victim of Many