Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

"A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

Scheduled Pinned Locked Moved Uncategorized
12 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • campuscodi@mastodon.socialC campuscodi@mastodon.social

    "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

    πŸ‘€πŸ‘€πŸ‘€πŸ‘€πŸ‘€

    Link Preview Image
    hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

    favicon

    (www.stepsecurity.io)

    softspeak@defcon.socialS This user is from outside of this forum
    softspeak@defcon.socialS This user is from outside of this forum
    softspeak@defcon.social
    wrote last edited by
    #2

    @campuscodi If it can exploit Github, I wonder if it could exploit Linux via flatpack downloads and apps as well.

    1 Reply Last reply
    0
    • campuscodi@mastodon.socialC campuscodi@mastodon.social

      "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

      πŸ‘€πŸ‘€πŸ‘€πŸ‘€πŸ‘€

      Link Preview Image
      hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

      favicon

      (www.stepsecurity.io)

      ghostonthehalfshell@masto.aiG This user is from outside of this forum
      ghostonthehalfshell@masto.aiG This user is from outside of this forum
      ghostonthehalfshell@masto.ai
      wrote last edited by
      #3

      @campuscodi

      It had to happen and Science Fiction predicted this. I think snow crash mentioned warring nano bots or something like that

      arnebab@rollenspiel.socialA 1 Reply Last reply
      0
      • R relay@relay.an.exchange shared this topic
      • campuscodi@mastodon.socialC campuscodi@mastodon.social

        "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

        πŸ‘€πŸ‘€πŸ‘€πŸ‘€πŸ‘€

        Link Preview Image
        hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

        favicon

        (www.stepsecurity.io)

        rpsu@mas.toR This user is from outside of this forum
        rpsu@mas.toR This user is from outside of this forum
        rpsu@mas.to
        wrote last edited by
        #4

        @campuscodi Wild! Consider the same but on Friday evening before a long weekend? How long does it take before bots get the information of when the RCE can be run without any quick human intervention 😲

        1 Reply Last reply
        0
        • R relay@relay.publicsquare.global shared this topic
        • ghostonthehalfshell@masto.aiG ghostonthehalfshell@masto.ai

          @campuscodi

          It had to happen and Science Fiction predicted this. I think snow crash mentioned warring nano bots or something like that

          arnebab@rollenspiel.socialA This user is from outside of this forum
          arnebab@rollenspiel.socialA This user is from outside of this forum
          arnebab@rollenspiel.social
          wrote last edited by
          #5

          @GhostOnTheHalfShell According to #Shadowrun the Internet went down in 2029 because the Crash-Virus ran wild and managed to destroy hardware.

          That was the start of hackers connecting their brains directly to their decks (which is why Shadowrun calls hackers "deckers"). Only 7 of the 32 original members survived:

          Link Preview Image
          Crash von 2029 - Die Shadowhelix - Das deutsche Shadowrun Wiki

          favicon

          (shadowhelix.de)

          It’s just three years from now, but since Shadowrun was wrong about the return of Magic in 2011, we may still have a chance.

          @campuscodi

          nymnympseudonymm@mstdn.scienceN 1 Reply Last reply
          0
          • campuscodi@mastodon.socialC campuscodi@mastodon.social

            "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

            πŸ‘€πŸ‘€πŸ‘€πŸ‘€πŸ‘€

            Link Preview Image
            hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

            favicon

            (www.stepsecurity.io)

            wendythedruid@thistlenfern.orgW This user is from outside of this forum
            wendythedruid@thistlenfern.orgW This user is from outside of this forum
            wendythedruid@thistlenfern.org
            wrote last edited by
            #6

            @campuscodi I am actually working on ai poisoning concept work - how much data can you feed an llm until it provides malicious code to the testers who interact with it when they ask for code x y or z. As with any poisoning or flooding , If malicious patterns dominate enough fine-tuning data, the model may generalize them, bypassing safeguards and producing harmful code when triggered.

            ntropic@chaos.socialN 1 Reply Last reply
            0
            • wendythedruid@thistlenfern.orgW wendythedruid@thistlenfern.org

              @campuscodi I am actually working on ai poisoning concept work - how much data can you feed an llm until it provides malicious code to the testers who interact with it when they ask for code x y or z. As with any poisoning or flooding , If malicious patterns dominate enough fine-tuning data, the model may generalize them, bypassing safeguards and producing harmful code when triggered.

              ntropic@chaos.socialN This user is from outside of this forum
              ntropic@chaos.socialN This user is from outside of this forum
              ntropic@chaos.social
              wrote last edited by
              #7

              @wendythedruid @campuscodi thank you for your service...

              1 Reply Last reply
              0
              • campuscodi@mastodon.socialC campuscodi@mastodon.social

                "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

                πŸ‘€πŸ‘€πŸ‘€πŸ‘€πŸ‘€

                Link Preview Image
                hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

                favicon

                (www.stepsecurity.io)

                pseudonym@mastodon.onlineP This user is from outside of this forum
                pseudonym@mastodon.onlineP This user is from outside of this forum
                pseudonym@mastodon.online
                wrote last edited by
                #8

                @campuscodi

                Closer and closer to Daniel Suarez 's "Demon."

                #book

                It doesn't have to be conscious or a person to follow an agenda to accomplish goals in the real world.

                As this one solicits crypto currency, it's a trivial step to have it supplied with some before launch, and "decide" to deploy money to accomplish physical tasks in the real world.

                We had that unsuccessful "task rabbit" for bots to hire humans a while ago.

                Totally doable for bot to bribe a human in an attack. #infosec

                webhat@infosec.exchangeW 1 Reply Last reply
                0
                • pseudonym@mastodon.onlineP pseudonym@mastodon.online

                  @campuscodi

                  Closer and closer to Daniel Suarez 's "Demon."

                  #book

                  It doesn't have to be conscious or a person to follow an agenda to accomplish goals in the real world.

                  As this one solicits crypto currency, it's a trivial step to have it supplied with some before launch, and "decide" to deploy money to accomplish physical tasks in the real world.

                  We had that unsuccessful "task rabbit" for bots to hire humans a while ago.

                  Totally doable for bot to bribe a human in an attack. #infosec

                  webhat@infosec.exchangeW This user is from outside of this forum
                  webhat@infosec.exchangeW This user is from outside of this forum
                  webhat@infosec.exchange
                  wrote last edited by
                  #9

                  @pseudonym @campuscodi taskrabbit for bots to hire humans, I totally missed that

                  1 Reply Last reply
                  0
                  • arnebab@rollenspiel.socialA arnebab@rollenspiel.social

                    @GhostOnTheHalfShell According to #Shadowrun the Internet went down in 2029 because the Crash-Virus ran wild and managed to destroy hardware.

                    That was the start of hackers connecting their brains directly to their decks (which is why Shadowrun calls hackers "deckers"). Only 7 of the 32 original members survived:

                    Link Preview Image
                    Crash von 2029 - Die Shadowhelix - Das deutsche Shadowrun Wiki

                    favicon

                    (shadowhelix.de)

                    It’s just three years from now, but since Shadowrun was wrong about the return of Magic in 2011, we may still have a chance.

                    @campuscodi

                    nymnympseudonymm@mstdn.scienceN This user is from outside of this forum
                    nymnympseudonymm@mstdn.scienceN This user is from outside of this forum
                    nymnympseudonymm@mstdn.science
                    wrote last edited by
                    #10

                    @ArneBab @GhostOnTheHalfShell @campuscodi I'm still waiting to see a Dragon flying over New York City

                    drwho@masto.hackers.townD 1 Reply Last reply
                    0
                    • campuscodi@mastodon.socialC campuscodi@mastodon.social

                      "A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets"

                      πŸ‘€πŸ‘€πŸ‘€πŸ‘€πŸ‘€

                      Link Preview Image
                      hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far - StepSecurity

                      favicon

                      (www.stepsecurity.io)

                      wakame@tech.lgbtW This user is from outside of this forum
                      wakame@tech.lgbtW This user is from outside of this forum
                      wakame@tech.lgbt
                      wrote last edited by
                      #11

                      @campuscodi

                      In this campaign, an AI-powered bot tried to manipulate an AI code reviewer into committing malicious code.

                      Easy solution: Don't have AI tools commit code.

                      1 Reply Last reply
                      0
                      • nymnympseudonymm@mstdn.scienceN nymnympseudonymm@mstdn.science

                        @ArneBab @GhostOnTheHalfShell @campuscodi I'm still waiting to see a Dragon flying over New York City

                        drwho@masto.hackers.townD This user is from outside of this forum
                        drwho@masto.hackers.townD This user is from outside of this forum
                        drwho@masto.hackers.town
                        wrote last edited by
                        #12

                        @Nymnympseudonymm @ArneBab @GhostOnTheHalfShell @campuscodi It was over Mt. Fuji.

                        1 Reply Last reply
                        0
                        • R relay@relay.mycrowd.ca shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups