HomeVulnerabilityNew npm threats can erase manufacturing programs with a single request

New npm threats can erase manufacturing programs with a single request

Basically, the code listens for a request containing a hardcoded key “DEFAULT_123” and, when triggered, executes a harmful rm-rf* command, deleting every thing within the software’s root listing.

The second bundle, system-health-sync-api, is a bit more stealthy and complicated, Pandya added. Masquerading as a system monitoring device, it collects atmosphere and system knowledge, and exposes a number of undocumented HTTP endpoints similar to /rm-rf-me and /destroy-host that, when hit, execute system-wiping instructions.

The malicious monitoring bundle additionally exfiltrates execution particulars (like hostname, IP, CWD, atmosphere hash) through electronic mail utilizing hardcoded SMTP credentials, enabling attackers to trace profitable deployments.

See also  BSI warnt vor Cyberattacken auf Energieversorgung
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular