Differential analysis raises red flags over @lottiefiles/lottie-player

Summary:
Malware targeting public repositories like npm, PyPI, and others has become increasingly prevalent, with malicious packages often published by new accounts. Recent incidents, such as the compromise of the @lottiefiles/lottie-player package, highlight the risks of supply chain attacks. These attacks can occur even in established packages, emphasizing the need for secure development practices and regular security assessments to mitigate risks.

#SupplyChainSecurity #MaliciousPackages #OpenSourceRisks

Keypoints:

  • Malicious packages have been observed on public repositories like npm, PyPI, and others.
  • New accounts often publish these packages, sometimes mimicking popular ones to gain trust.
  • Recent incidents include the compromise of the @lottiefiles/lottie-player package, which was used to steal crypto wallet assets.
  • Malicious versions of @lottiefiles/lottie-player were published using a compromised access token.
  • Developers noticed unusual behaviors in the package, leading to community discussions and alerts.
  • Security assessments and differential analysis can help detect malicious changes in package versions.
  • Pinning dependencies to known-good versions can reduce the risk of supply chain attacks.
  • Regular updates and security assessments are crucial to maintain the integrity of software dependencies.

  • MITRE Techniques:

  • Supply Chain Compromise (T1195): Attackers target software supply chains to insert malicious code into legitimate software packages.
  • Account Compromise (T1078): Malicious actors hijack accounts of maintainers to publish malicious package versions.
  • Code Injection (T1059): Attackers modify existing code in a package to introduce malicious functionality.

  • IoC:

  • No IoC Found


  • Full Research: https://www.reversinglabs.com/blog/differential-analysis-raises-red-flags-over-lottiefiles/lottie-player