Why have supply chain attacks have become a daily occurrence?
from dhruv3006@lemmy.world to programming@programming.dev on 31 Mar 04:34
https://lemmy.world/post/44969805
from dhruv3006@lemmy.world to programming@programming.dev on 31 Mar 04:34
https://lemmy.world/post/44969805
#programming
threaded - newest
If you attack the thing that customers use you affect one company.
If you attack the thing that developers use you affect a fuck tonne of companies.
Don’t forget the most important part - by attacking you make money in proportion to the amount of people affected.
Debian Linux, and many other Linux distros, have extensive measures to protect their supply chain. Packages are signed and verified, by multiple developers, before being built reproducibly (I can build and verify and identical binary/package). The build system has layers, such that if only a single layer is compromised, nothing happens and nobody flinches.
Programming langauge specific package repos, have no such protections. A single developer has their key/token/account, and then they can push packages, which are often built on their own devices. There are no reproducible build to ensure the binaries are from the same source code, and no multi-party signing to ensure that multiple devs would need to be compromised in order to compromise the package.
So what happened, probably, is some developer got phished or hacked, and gave up their API key. And the package they made was popular, and frequently ran unsandboxed on devs personal devices, so when other developers downloaded the latest version of that package, they got hacked too. The attackers then used their devices to push more malicious packages to the repo, and the cycle repeats.
And that’s why supply chain attacks are now a daily occurrence.
xkcd.com/2347/
<img alt="" src="https://lemmy.today/api/v3/image_proxy?url=https%3A%2F%2Fimgs.xkcd.com%2Fcomics%2Fdependency_2x.png">
The guy in Nebraska probably has fewer resources to protect against you than the sum total of all of the downstream companies that you’re trying to attack.
Because they’re pretty effective currently
Because atomic dependencies.
They are easy and effective
how many real-world attacks happened since the XZ fiasco outside of the webshit ecosystem?
Is it the attacks themselves that have become a daily occurrence, or the detection thereof?
Because, its easier to catch many fish with a large net than many fish with a small one
Because in web development it is perfectly normal to use 2 frameworks and 1200 random libraries to do the simplest of things. One compromised library will compromise all applications that rely on it directly or indirectly, no matter how small.
I absolutely hate this aspect of web development and frankly I’m scared every time I type npm install