Ilkka Turunen

2.1K posts

Ilkka Turunen banner
Ilkka Turunen

Ilkka Turunen

@llkkaT

Field CTO @sonatype. Software supply chain management, infosec and devsecops veteran, occasional speaker and dependency hell enthusiast. 🇬🇧 & 🇫🇮

London, England Katılım Mart 2011
1.3K Takip Edilen595 Takipçiler
Ilkka Turunen retweetledi
LottieFiles
LottieFiles@LottieFiles·
Incident Response for Recently Infected Lottie-Player versions 2.05, 2.06, 2.0.7 Comm Date/Time: Oct 31st, 2024 04:00 AM UTC Incident: On October 30th ~6:20 PM UTC - LottieFiles were notified that our popular open source npm package for the web player @lottiefiles/lottie-player had unauthorized new versions pushed with malicious code. This does not impact our dotlottie player and/or SaaS services. Our incident response plans were activated as a result. We apologize for this inconvenience and are committed to ensuring safety and security of our users, customers, their end-users, developers, and our employees. Immediate Mitigation Actions - Published a new safe version (2.0.8) - Unpublished the compromised package versions from npm - Removed all access and associated tokens/services accounts of the impacted developer Impact - Versions 2.0.5, 2.0.6, 2.0.7 were published directly to npmjs.com over the course of an hour using a compromised access token from a developer with the required privileges. - The unauthorized versions contained code that prompted for connecting to user’s crypto wallets. - A large number of users using the library via third-party CDNs without a pinned version were automatically served the compromised version as the latest release. With the publishing of the safe version, those users would have automatically received the fix. Recommended Steps - If using 2.0.5, 2.0.6 and 2.0.7 versions please update to the latest version 2.0.8 -- SHA: sha512-PWfm8AFyrijfnvGc2pdu6avIrnC7UAjvvHqURNk0DS748/ilxRmYXGYkgdU1z/BIl3fbHCZJ89Zqjwg/9cx6NQ== - If you are unable to update the player immediately, it is recommended that you communicate to Lottie-player end-users to NOT accept any attempts to connect their crypto wallets. Next Steps - LottieFiles continues to work through its incident response plan and has also engaged an external incident response team to help further investigate the compromise. - We have confirmed that our other open source libraries, open source code, Github repositories, and our SaaS were not affected. If you believe you’re affected, don’t hesitate to reach out to us at priority_support@lottiefiles.com
English
5
24
47
13.8K
Ilkka Turunen
Ilkka Turunen@llkkaT·
It seems like the vulnerability affects cups, a printer driver found in linux and unix like systems. The good news is the attack only works if the attacker can connect via UDP on port 631. Also requires a print job to start evilsocket.net/2024/09/26/Att…
English
1
4
16
1.9K
Ilkka Turunen retweetledi
Andrey Akinshin
Andrey Akinshin@andrey_akinshin·
Dependency is replaced by one-liner, weekly traffic is reduced by 440GB
Andrey Akinshin tweet media
English
161
678
8.7K
935.8K
Ilkka Turunen retweetledi
George Kurtz
George Kurtz@George_Kurtz·
CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts. Mac and Linux hosts are not impacted. This is not a security incident or cyberattack. The issue has been identified, isolated and a fix has been deployed. We refer customers to the support portal for the latest updates and will continue to provide complete and continuous updates on our website. We further recommend organizations ensure they’re communicating with CrowdStrike representatives through official channels. Our team is fully mobilized to ensure the security and stability of CrowdStrike customers.
English
4K
5.8K
20.5K
10.4M
Ilkka Turunen
Ilkka Turunen@llkkaT·
The NVD has stated it is getting new staffing and aims to clear the backlog by the end of the fiscal year (which would be September). Sceptical if that will indeed happen, but if so users of tools relying on it directly will have one busy summer with alerts nist.gov/itl/nvd
English
0
1
0
115
Ilkka Turunen
Ilkka Turunen@llkkaT·
🚨 an example of an adversary trying to push their malware as a coding solution. Please be careful with any dependencies
Ax Sharma@Ax_Sharma

A threat actor is now advising StackOverflow devs seeking debugging help to install a 'pytoileur' #Python package as a "solution" to their code troubles. 🛑DO NOT fall for this, it's a trap—the package has encoded code hidden on line 17 via whitespaces and infects Windows users with #trojan as soon as it's installed! sonatype.com/blog/pypi-cryp… #opensource #malware

English
0
1
2
236
Ilkka Turunen
Ilkka Turunen@llkkaT·
It was a pleasure taking a part in this engaging conversation
CEPS ThinkTank@CEPS_thinktank

The #SOSS2024 Policy Summit is coming to an end with our last panel, where we will discuss the economic advantage of secure open-source software in Europe. We are joined by: 📌 MEP @karmel80 📌 Martina Goetz, @sapopensource 📌 Per Beming, @ericsson 📌 @llkkaT, @sonatype 📌 @torgo, @Samsung Moderated by Ana Jimenez, @todogroup Learn more 👉 ceps.eu/ceps-events/se…

English
0
0
1
115
Ilkka Turunen
Ilkka Turunen@llkkaT·
The NVD backlog just went over 10,000 unanalysed issues
Ilkka Turunen tweet media
English
0
2
4
169