This article is machine translated
Show original
The Trust Wallet browser extension v2.68 incident is related to the Sha1-Hulud worm poisoning incident that broke out in November. After obtaining the relevant source code and Chrome Web Store API key, the attackers uploaded v2.68 with a backdoor... completing a far-reaching supply chain attack.

Trust Wallet
@TrustWallet
We’re sharing a work-in-progress update on the Browser Extension v2.68 incident.
1/ Our current hypothesis on how this attack occurred and what this signals for the wider industry.
Full details are in the blog: https://short.trustwallet.com/v268-update
The Sha1-Hulud worm incident in November

Cos(余弦)
@evilcos
11-26
这波供应链攻击有点刺激,带蠕虫性质了(如图),开发者使用被感染的库后,有概率还会帮继续感染传播…
https://wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack…
受影响的部分仓库:
https://github.com/search?q=Sha1-Hulud%3A+The+Second+Coming.&type=repositories…
https://github.com/search?q=Free+AI+at+api.airforce&type=repositories&p=1…
我们的 MistEye 已经第一时间推送了相关威胁情报,受影响的尽快排查…

Beware of a new wave of supply chain worm attacks…🤦♂️

23pds (山哥)
@im23pds
⚠️
NPM 供应链攻击 Shai-Hulud 3.0 再次来袭
请各项目方和平台注意防范!
此前怀疑 @TrustWallet API key 泄露可能就是 Shai-Hulud 2.0 攻击导致的结果。
cc @evilcos @Foresight_News @wublockchain12 x.com/CharlieEriksen…
Our November alert details: Threat Intelligence | NPM Poisoning Analysis — Shai-Hulud Attack Reproduction: mp.weixin.qq.com/s/EeZYZmlKhL7...…
We have confirmed through self-check that we are not referencing this component (including its library), and we will remain highly vigilant. 🫡
Sector:
From Twitter
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share
Relevant content




