123
SSH keys stolen by stream of malicious PyPI and npm packages
(www.bleepingcomputer.com)
Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!
Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.
Hope you enjoy the instance!
Rules
Follow the wormhole through a path of communities !webdev@programming.dev
IDK, virus scanners and malware detectors could do these things before AI.
You could search for stuff like directly accessing the
~.ssh
directory, or any invocations ofwget
orcurl
to download external scripts and run them through an interpreter and flag those for closer inspection.If you want to get fancier, automate installing packages in an isolated environment (like a container or VM) and keep track of every file system access and network request they make.
Sure, eventually they'll figure out ways to obfuscate those things, too, but it could at least prevent people from doing things in such blatantly obvious ways.