Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. “The researchers suspect that Glassworm—the name they assigned to the attack group—is using LLMs to generate these convincingly legitimate-appearing packages.

“The researchers suspect that Glassworm—the name they assigned to the attack group—is using LLMs to generate these convincingly legitimate-appearing packages.

Scheduled Pinned Locked Moved Uncategorized
7 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • aral@mastodon.ar.alA This user is from outside of this forum
    aral@mastodon.ar.alA This user is from outside of this forum
    aral@mastodon.ar.al
    wrote last edited by
    #1

    RE: https://mastodon.scot/@simon_brooke/116232834837623434

    “The researchers suspect that Glassworm—the name they assigned to the attack group—is using LLMs to generate these convincingly legitimate-appearing packages. “At the scale we’re now seeing, manual crafting of 151+ bespoke code changes across different codebases simply isn’t feasible,” they explained. Fellow security firm Koi, which has also been tracking the same group, said it, too, suspects the group is using AI.”

    omer@hgaza.masto.hostO aral@mastodon.ar.alA 2 Replies Last reply
    0
    • aral@mastodon.ar.alA aral@mastodon.ar.al

      RE: https://mastodon.scot/@simon_brooke/116232834837623434

      “The researchers suspect that Glassworm—the name they assigned to the attack group—is using LLMs to generate these convincingly legitimate-appearing packages. “At the scale we’re now seeing, manual crafting of 151+ bespoke code changes across different codebases simply isn’t feasible,” they explained. Fellow security firm Koi, which has also been tracking the same group, said it, too, suspects the group is using AI.”

      omer@hgaza.masto.hostO This user is from outside of this forum
      omer@hgaza.masto.hostO This user is from outside of this forum
      omer@hgaza.masto.host
      wrote last edited by
      #2

      @aral
      Hello brother Aral, I want to ask you for a favor My name is Omar Ziada, and I live in Gaza It's a very difficult life I'm truly sorry to bother you, but I don't receive any assistance no one donates to me I just want you to post something for me I'm asking my followers to donate to me Please brother help me with this You're a very kind person with a big and wonderful heart Please for my sake and for the sake of my family Please, brother, reply to me, I need you Reply to me and talk to me

      1 Reply Last reply
      0
      • aral@mastodon.ar.alA aral@mastodon.ar.al

        RE: https://mastodon.scot/@simon_brooke/116232834837623434

        “The researchers suspect that Glassworm—the name they assigned to the attack group—is using LLMs to generate these convincingly legitimate-appearing packages. “At the scale we’re now seeing, manual crafting of 151+ bespoke code changes across different codebases simply isn’t feasible,” they explained. Fellow security firm Koi, which has also been tracking the same group, said it, too, suspects the group is using AI.”

        aral@mastodon.ar.alA This user is from outside of this forum
        aral@mastodon.ar.alA This user is from outside of this forum
        aral@mastodon.ar.al
        wrote last edited by
        #3

        What I don’t get is how this snippet passed code review regardless.

        I mean, it’s clearly dodgy and the last line basically meaningless without the code being evaluated.

        The real story here isn’t the invisible Unicode characters, it’s the lack of proper code review on code submissions.

        Link Preview Image
        claudius@darmstadt.socialC oliveruv@mastodon.socialO theriac@plasmatrap.comT char@ioc.exchangeC 4 Replies Last reply
        0
        • aral@mastodon.ar.alA aral@mastodon.ar.al

          What I don’t get is how this snippet passed code review regardless.

          I mean, it’s clearly dodgy and the last line basically meaningless without the code being evaluated.

          The real story here isn’t the invisible Unicode characters, it’s the lack of proper code review on code submissions.

          Link Preview Image
          claudius@darmstadt.socialC This user is from outside of this forum
          claudius@darmstadt.socialC This user is from outside of this forum
          claudius@darmstadt.social
          wrote last edited by
          #4

          @aral I agree that code reviews should generally be "wtf?! eval?!", but it is always good to remind people that an empty looking string is not necessarily really empty.

          1 Reply Last reply
          0
          • aral@mastodon.ar.alA aral@mastodon.ar.al

            What I don’t get is how this snippet passed code review regardless.

            I mean, it’s clearly dodgy and the last line basically meaningless without the code being evaluated.

            The real story here isn’t the invisible Unicode characters, it’s the lack of proper code review on code submissions.

            Link Preview Image
            oliveruv@mastodon.socialO This user is from outside of this forum
            oliveruv@mastodon.socialO This user is from outside of this forum
            oliveruv@mastodon.social
            wrote last edited by
            #5

            @aral lol, the eval call not even obfuscated

            1 Reply Last reply
            0
            • aral@mastodon.ar.alA aral@mastodon.ar.al

              What I don’t get is how this snippet passed code review regardless.

              I mean, it’s clearly dodgy and the last line basically meaningless without the code being evaluated.

              The real story here isn’t the invisible Unicode characters, it’s the lack of proper code review on code submissions.

              Link Preview Image
              theriac@plasmatrap.comT This user is from outside of this forum
              theriac@plasmatrap.comT This user is from outside of this forum
              theriac@plasmatrap.com
              wrote last edited by
              #6

              @aral@mastodon.ar.al

              I feel like I need to restate this:

              An "empty" string in back ticks not ringing any alarm bells.

              1 Reply Last reply
              0
              • aral@mastodon.ar.alA aral@mastodon.ar.al

                What I don’t get is how this snippet passed code review regardless.

                I mean, it’s clearly dodgy and the last line basically meaningless without the code being evaluated.

                The real story here isn’t the invisible Unicode characters, it’s the lack of proper code review on code submissions.

                Link Preview Image
                char@ioc.exchangeC This user is from outside of this forum
                char@ioc.exchangeC This user is from outside of this forum
                char@ioc.exchange
                wrote last edited by
                #7

                @aral I agree, I had the same thought, first of all an eval function is super suspicious; "eval is evil", on the other hand what the earth is the const s doing there. And in the name of love what is the reviewer thinking about when someone does a PR with this kind of "functionality". I will check but I think that a simple SAST is going to complain about this PR.
                On a second thought maybe the snippet provided by the security researchers is just a non realistic example to illustrate the concept.

                1 Reply Last reply
                1
                0
                • R relay@relay.infosec.exchange shared this topic
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups