Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

npm adds 2FA gate exposure and package installation controls for supply chain attacks

Packagist supply chain attack infects 8 packages using Linux malware hosted on GitHub

Ferrari uses IBM’s AI to create F1 superfans

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Packagist supply chain attack infects 8 packages using Linux malware hosted on GitHub
Identity

Packagist supply chain attack infects 8 packages using Linux malware hosted on GitHub

By May 23, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 23, 2026Malware / DevSecOps

A new “coordinated” supply chain attack campaign affected eight packages on Packagist that contained malicious code designed to execute Linux binaries retrieved from GitHub release URLs.

“The affected packages were all Composer packages, but the malicious code was not added to composer.json,” Socket said. “Instead, it was inserted into package.json for projects that ship JavaScript build tools along with PHP code.”

This “cross-ecosystem deployment” makes activity more visible to developers and security teams scanning PHP dependencies, as they may focus only on Composer-related metadata while skipping package.json lifecycle hooks bundled within packages. The malicious version has since been removed from Packagist.

Analysis of the package reveals that the upstream repository has been modified to include a post-installation script that attempts to download Linux binaries from a GitHub release URL (‘github’).[.]com/parikhpreyash4/systemd-network-helper-aa5c751f”) in the “/tmp/.sshd” folder, change the permissions using “chmod” to give execution permissions to all users, and run it in the background.

The package names and associated affected versions are listed below.

moritz-sauer-13/silver Stripe-cms-theme (dev-master) crosiersource/crosierlib-base (dev-master) devdojo/wave (dev-main) devdojo/genesis (dev-main) katanaui/katana (dev-main) Elitedevsquad/sidecar-laravel (3.x-dev) r2luna/brain (dev-main) baskarcm/tzi-chat-ui (dev-main)

Socket’s investigation found references to the same payload across 777 files in GitHub, suggesting it may be part of a broader campaign. Added to GitHub workflow at least twice. However, it is currently unclear how many of these match individual compromises, forks, duplicate package artifacts, or cached references.

“This suggests that the attackers did not rely on a single execution mechanism. In the package artifact, the payload was triggered through the package.json post-installation script,” the application security firm said. “In the workflow file, it was placed to run during a GitHub Actions job.”

Furthermore, the exact nature of the payload downloaded from GitHub is unknown as the GitHub account associated with the repository hosting it is no longer available. The choice of name “gvfsd-network” for this malware is interesting. This is because it refers to the GNOME Virtual File System (GVfs) daemon, which is responsible for managing and browsing network shares.

“Even without the second-stage binary, a malicious installer is enough to warrant blocking,” Socket said. “It executes code remotely during the installation or build workflow and attempts to hide its activity by disabling TLS validation, suppressing errors, and running downloaded binaries in the background.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFerrari uses IBM’s AI to create F1 superfans
Next Article npm adds 2FA gate exposure and package installation controls for supply chain attacks

Related Posts

npm adds 2FA gate exposure and package installation controls for supply chain attacks

May 23, 2026

Claude Mythos AI finds 10,000 high-severity flaws in widely used software

May 23, 2026

Laravel-Lang PHP package compromised to deliver cross-platform credential stealer

May 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

npm adds 2FA gate exposure and package installation controls for supply chain attacks

Packagist supply chain attack infects 8 packages using Linux malware hosted on GitHub

Ferrari uses IBM’s AI to create F1 superfans

Nuclear startup Deep Fission says it’s going public again, but I have my doubts

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.