Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Microgripper developed for precise assembly of fragile cell spheroids in tissue engineering

5 sales challenges impacting MSP cybersecurity revenue

Tainted Ruby Gems and Go Modules Abuse CI Pipelines to Steal Credentials

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Tainted Ruby Gems and Go Modules Abuse CI Pipelines to Steal Credentials
Identity

Tainted Ruby Gems and Go Modules Abuse CI Pipelines to Steal Credentials

By May 1, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 1, 2026Supply chain attacks/malware

New software supply chain attack campaigns have been observed using sleeper packages as a vector to then push malicious payloads that enable credential theft, GitHub Actions modification, and SSH persistence.

This activity is believed to be the work of the GitHub account ‘BufferZoneCorp’, which published a set of repositories related to malicious Ruby gems and Go modules. As of this writing, the package has been removed from RubyGems and the Go module is blocked. The names of the libraries are listed below –

Ruby: knot-activesupport-logger knot-devise-jwt-helper knot-rack-session-store knot-rails-assets-pipeline knot-rspec-formatter-json knot-date-utils-rb (Sleeper gem) knot-simple-formatter (Sleeper gem) Go: github[.]com/BufferZoneCorp/go-metrics-sdk github[.]com/BufferZoneCorp/go-weather-sdk github[.]com/BufferZoneCorp/go-retryablehttp github[.]com/BufferZoneCorp/go-stdlib-ext github[.]com/BufferZoneCorp/grpc-client github[.]com/BufferZoneCorp/net-helper github[.]com/BufferZoneCorp/config-loader github[.]com/BufferZoneCorp/log-core (sleeper module) github[.]com/BufferZoneCorp/go-envconfig (sleeper module)

The identified packages disguise themselves as recognizable and well-known modules such as activesupport-logger, device-jwt, go-retryablehttp, grpc-client, and config-loader to evade detection and trick users into downloading them.

“This account is part of a software supply chain campaign targeting developers, CI runners, and the built environment across two ecosystems,” said socket security researcher Kirill Boychenko in an analysis published today.

Ruby gems are designed to automate credential theft during installation, collection of environment variables, SSH keys, AWS secrets, .npmrc, .netrc, GitHub CLI configuration, and RubyGems credentials. The stolen data is exposed to an attacker-controlled webhook.[.]Site endpoint.

The Go module, on the other hand, has broader functionality, including modifying GitHub Actions workflows, installing fake Go wrappers, stealing developer data, and adding hardcoded SSH public keys to “~/.ssh/authorized_keys” for remote access to compromised hosts. Not all modules have the same payload. Instead, it is distributed across the cluster.

“The module runs through init(), finds GITHUB_ENV and GITHUB_PATH, sets HTTP_PROXY and HTTPS_PROXY, writes a fake go executable to the cache directory, and adds that directory to the workflow path so that the wrapper is selected before the real binary,” Boychenko explained.

“This wrapper can intercept or influence subsequent execution while passing control to the legitimate binary to avoid job interruption.”

Users who installed the package are advised to remove the package from their systems, check for signs of access to sensitive files or unauthorized changes to ‘~/.ssh/authorized_keys’, rotate exposed credentials, and inspect network logs for outbound HTTPS traffic to extraction points.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDAMPE telescope reshapes our understanding of cosmic rays
Next Article 5 sales challenges impacting MSP cybersecurity revenue

Related Posts

5 sales challenges impacting MSP cybersecurity revenue

May 1, 2026

PyTorch Lightning and Intercom Client Suffer Supply Chain Attack to Steal Credentials

April 30, 2026

SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

April 30, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Microgripper developed for precise assembly of fragile cell spheroids in tissue engineering

5 sales challenges impacting MSP cybersecurity revenue

Tainted Ruby Gems and Go Modules Abuse CI Pipelines to Steal Credentials

DAMPE telescope reshapes our understanding of cosmic rays

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.