Dharshan (JPD)

275 posts

Dharshan (JPD) banner
Dharshan (JPD)

Dharshan (JPD)

@JPD_1206

God's plan💫

Dubai, United Arab Emirates Katılım Kasım 2021
0 Takip Edilen1.1K Takipçiler
Sidhanta palei
Sidhanta palei@r00tSid·
@JPD_1206 Where did you found the package, was it on GitHub or an js file.
English
1
0
1
592
Dharshan (JPD)
Dharshan (JPD)@JPD_1206·
I reported a supply chain dependency confusion issue to Amazon that resulted in confirmed internal RCE via a malicious npm package. The package executed automatically during normal dependency resolution and returned a callback proving it ran inside Amazon’s internal environment. The report was closed as “operational security.” This isn’t OSINT. This isn’t theoretical. This was real code execution inside corporate infrastructure. I’ve followed up multiple times and contacted @Hacker0x01 support. No clarification so far. @amazon @Hacker0x01 #BugBounty #AppSec #SupplyChainSecurity #hackerone #amazonsecurity
Dharshan (JPD) tweet media
English
6
1
94
6.8K
Dharshan (JPD)
Dharshan (JPD)@JPD_1206·
I appreciate the acknowledgment that these gray areas are tricky. To clarify: no credentials, tokens, or sensitive secrets were accessed or exfiltrated. The callback was limited to minimal metadata necessary to demonstrate execution and validate the dependency confusion risk under research scope. I understand how automated callbacks in public packages can raise TOS and optics concerns. My intent was vulnerability validation not data harvesting or malicious activity.
English
0
0
0
50
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
I think the gray areas of research are SUPER tricky to reason about in a nuanced way. The labeling/taxonomy of threat intelligence ends up being a subtle but important part. A part of that work is creating a narrative that conveys the relevant information in as concise way as possible. I’m definitely not perfect in that way either. So I appreciate anybody who is willing to have conversations about how we do that well as a community, to make sure the larger ecosystem gets the most value from the output we produce. 🫶
English
1
0
2
62
Marius Benthin
Marius Benthin@marius_benthin·
Another wave of #NPM packages related to #PhantomRaven. New endpoint for remote dynamic dependencies: hxxp://package[.]storeartifacts[.]com/npm/ Packages: clean-order:8.0.0 typescript-urql:8.0.0 google-camelcase:8.0.0 add-react-displayname:0.0.6
Marius Benthin tweet mediaMarius Benthin tweet media
English
4
10
41
5.1K
Marius Benthin
Marius Benthin@marius_benthin·
@JPD_1206 @cyb3rops @CharlieEriksen Any npm publisher can use your name, create a similar-looking email address, and impersonate you. If trust is based on a name alone, it's only a matter of time before a real attack slips through unnoticed.
English
3
0
0
115
Dharshan (JPD)
Dharshan (JPD)@JPD_1206·
@CharlieEriksen @cyb3rops @marius_benthin Appreciate that, Charlie. If attribution takes minutes to verify, then it clearly wasn’t anonymous. My concern is simply the jump from observable behavior to public attacker branding without verification.
English
0
0
0
30
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
Many of his accounts include his actual name too. When I first started tracking his activity a year ago, it took me minutes to confirm all the packages he’s been spamming with were from him. Could it be clearer? For sure. But it is NOT difficult to work out. That’s the “research” part of the work 😊
English
1
0
1
40
Dharshan (JPD)
Dharshan (JPD)@JPD_1206·
“Attribution isn’t just three letters in isolation. 'JPD' is the consistent npm publisher name, included across all packages, along with a reachable contact email. Before publicly labeling someone an attacker, wouldn’t basic due diligence include checking the publisher identity or attempting contact?
English
1
0
0
82
Dharshan (JPD)
Dharshan (JPD)@JPD_1206·
There seems to be a misunderstanding. This was authorized supply-chain research conducted under bug bounty scope not malicious activity. Mislabeling researchers as attackers without confirmed attribution is irresponsible and damages reputations. I’m open to technical discussion if needed!
English
1
0
0
45
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
@marius_benthin @cyb3rops @JPD_1206 But why are we calling it an attacker, with a fancy hashtag, when it’s just a well-attributed package by a bug bounty hunter/researcher? I don’t understand that part. 🫣
English
2
0
0
234
Dharshan (JPD)
Dharshan (JPD)@JPD_1206·
Security work pays off — literally and professionally. Disclosed a CRITICAL issue to @krakenfx , helped improve their security, and earned a six-figure bounty $$$,$$$. This only pushes me to go harder in bug bounty & security research 💪 #HackerMindset #BugBounty #kraken #Web3
Dharshan (JPD) tweet media
English
9
1
188
9.6K