{"id":18981,"date":"2022-05-09T03:10:28","date_gmt":"2022-05-09T11:10:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/09\/news-12714\/"},"modified":"2022-05-09T03:10:28","modified_gmt":"2022-05-09T11:10:28","slug":"news-12714","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/09\/news-12714\/","title":{"rendered":"A scanning tool for open-sourced software packages? Yes, please!"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 May 2022 10:49:02 +0000<\/strong><\/p>\n<p>The Open Source Security Foundation (OpenSSF), a collective of industry leaders aimed at improving the security of open-source software (OSS), recently <a href=\"https:\/\/openssf.org\/blog\/2022\/04\/28\/introducing-package-analysis-scanning-open-source-packages-for-malicious-behavior\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">announced the release of a prototype tool<\/a> that scans for malicious packages in open source repositories. This tool, conveniently called <a href=\"https:\/\/github.com\/ossf\/package-analysis\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Package Analysis<\/a>, analyzed and identified <a href=\"https:\/\/github.com\/ossf\/package-analysis\/blob\/main\/docs\/case_studies.md\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">at least 200<\/a> malicious packages uploaded to <a href=\"https:\/\/pypi.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">PyPI<\/a> (The Python Package Index) and <a href=\"https:\/\/www.npmjs.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">npm<\/a> after a month of analysis.<\/p>\n<p>Many have embraced open source for the fun and exciting ways of using it. Organizations of all sizes and industries rely on them for their day-to-day tasks, including critical ones. But because OSS requires people and businesses\u2014sometimes, governments\u2014to trust software developers unquestioningly, open source is susceptible to several risks, including exploitation.<\/p>\n<p>Caleb Brown, who is part of Google&#8217;s Open Source Security Team and OpenSSF&#8217;s Securing Critical Projects Working Group, recognizes the considerable role open source plays in the software world and how &#8220;it&#8217;s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software.&#8221;<\/p>\n<p>&#8220;Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute,&#8221; Brown said.<\/p>\n<p>Several open source projects have been the subject of malware incidents. One was found to contain a <a href=\"https:\/\/blog.sonatype.com\/newly-found-npm-malware-mines-cryptocurrency-on-windows-linux-macos-devices\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cryptominer<\/a>, and some have been hijacked to include <a href=\"https:\/\/github.com\/faisalman\/ua-parser-js\/issues\/536\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">malware<\/a>. And in the most recent incident, some open source developers decided to <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/03\/anti-war-open-source-software-developer-targets-russians-and-belarussians-with-protestware\/\">take a stand<\/a> against Russia&#8217;s invasion of Ukraine. To everyone&#8217;s dismay, the protestware also contained a wiper feature designed to destroy all files on systems geolocated in Russia or Belarus.<\/p>\n<h2>The Package Analysis project<\/h2>\n<p>Package Analysis doesn&#8217;t only answer essential &#8220;what&#8221; questions about a package\u2014&#8221;what files does it access, what addresses does it connect to, and what commands does it run?&#8221;\u2014but also looks at its behavior over time. This is to alert people when a usually safe package starts to act suspiciously.<\/p>\n<p>&#8220;Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute,&#8221; Brown said. &#8220;As a result, malicious packages like&nbsp;<code><a href=\"https:\/\/github.com\/advisories\/GHSA-pjwm-rvh2-c87w\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ua-parser-js<\/a><\/code>, and&nbsp;<code><a href=\"https:\/\/snyk.io\/blog\/peacenotwar-malicious-npm-node-ipc-package-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">node-ipc<\/a><\/code>&nbsp;are regularly uploaded to popular repositories despite their best efforts, with sometimes devastating consequences for users.&#8221;<\/p>\n<p>Package Analysis performs dynamic analysis of all packages uploaded to known OSS repositories and records results in a table in <a href=\"https:\/\/cloud.google.com\/bigquery\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BigQuery<\/a>, Google&#8217;s cloud warehouse. The scanning tool alerts OSS users of malicious changes to packages they use before they download them. Overall, this secures the software supply chain.<\/p>\n<p>It&#8217;s no surprise to see Google supporting the project, describing it as &#8220;a welcome step toward helping secure the open source packages we all depend on.&#8221;<\/p>\n<p>OpenSSF invites anyone interested to get involved in the project. Here is a wishlist of future goals for the project:<\/p>\n<ul>\n<li>Detecting differences in package behavior over time<\/li>\n<li>Automating the processing of the Package Analysis results<\/li>\n<li>Storing the packages themselves as they are processed for long-term analysis<\/li>\n<li>Improving the reliability of the pipeline<\/li>\n<\/ul>\n<h2>If you secure open source, you secure a supply chain<\/h2>\n<p>Google has been <a href=\"https:\/\/blog.malwarebytes.com\/reports\/2021\/06\/two-google-plans-that-could-make-open-source-code-more-secure\/\">aiming to secure open source<\/a> to protect its developers and users for a while now.<\/p>\n<p>In 2021, the company invested in <a href=\"https:\/\/security.googleblog.com\/2021\/04\/rust-in-linux-kernel.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">a project<\/a> to evaluate <a href=\"https:\/\/www.rust-lang.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Rust<\/a>, a favorite programming language among programmers, as a supporting language for further developing the Linux kernel. As we all know, Android is built on the Linux kernel. The project&#8217;s goal was not to replace the entire Linux code but to improve parts of it using code written in Rust.<\/p>\n<p>The company believes that Rust would &#8220;help us reduce the number of potential bugs and security vulnerabilities in privileged code while playing nicely with the core kernel and preserving its performance characteristics.&#8221;<\/p>\n<p>Google also <a href=\"https:\/\/security.googleblog.com\/2021\/06\/introducing-slsa-end-to-end-framework.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">proposed<\/a> an end-to-end framework to maintain the integrity of the supply chain. Dubbed <a href=\"https:\/\/github.com\/slsa-framework\/slsa\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Supply chain Levels for Software Artifacts<\/a> (SLSA, pronounced &#8220;Salsa&#8221;), it is designed to protect the source and build integrities of open source. It also aims to provide users with information on whether a package meets a certain standard based on source, build, provenance, and security aspects.<\/p>\n<p>This way, users are empowered to make informed choices on the security posture of software they heavily rely on.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/05\/a-scanning-tool-for-open-sourced-software-packages-yes-please\/\">A scanning tool for open-sourced software packages? Yes, please!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/05\/a-scanning-tool-for-open-sourced-software-packages-yes-please\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 09 May 2022 10:49:02 +0000<\/strong><\/p>\n<p>OpenSSF recently introduced a dynamic analysis tool for all OSS packages when uploaded to open source repositories.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/05\/a-scanning-tool-for-open-sourced-software-packages-yes-please\/\">A scanning tool for open-sourced software packages? Yes, please!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26023,26024,1670,24896,26025,26026,26027,26028,26029,26030,26031,26032,10497,26033,26034],"class_list":["post-18981","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bigquery","tag-caleb-brown","tag-google","tag-npm","tag-open-source-security-foundation","tag-open-source-security-team","tag-open-sourced-software","tag-openssfmpypi","tag-oss","tag-package-analysis","tag-python-package-index","tag-rust","tag-security-world","tag-slsa","tag-supply-chain-levels-for-software-artifacts"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18981"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18981\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18981"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}