<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(socket.dev) Malicious Ruby Gems and Go Modules Impersonate Developer Tools to Compromise CI Environments and Steal Secrets]]></title><description><![CDATA[<p>(socket.dev) Malicious Ruby Gems and Go Modules Impersonate Developer Tools to Compromise CI Environments and Steal Secrets</p><p>New supply chain campaign by threat actor BufferZoneCorp targets dev/CI environments via malicious Ruby gems and Go modules. Packages like `knot-activesupport-logger` and `go-retryablehttp` deploy credential theft, GitHub Actions tampering, and SSH persistence.</p><p>In brief - A multi-stage attack impersonates legitimate dev tools to harvest SSH/AWS/GitHub secrets, poison CI workflows, and establish persistence. Sleeper packages and typosquatting evade detection, exfiltrating data via hidden endpoints.</p><p>Technically - Ruby gems use `extconf.rb` to steal env vars (e.g., `~/.ssh/id_rsa`, `~/.aws/credentials`) during install, exfiltrating JSON-encoded data to `webhook[.]site/49c21843...`. Go modules abuse `init()` to modify `GITHUB_ENV`, disable `GOSUMDB`, and inject fake `go` wrappers. One module appends hardcoded SSH keys to `authorized_keys`. Obfuscation includes decimal-encoded endpoints and fragmented env var names.</p><p>Source: <a href="https://socket.dev/blog/malicious-ruby-gems-and-go-modules-steal-secrets-poison-ci" rel="nofollow noopener"><span>https://</span><span>socket.dev/blog/malicious-ruby</span><span>-gems-and-go-modules-steal-secrets-poison-ci</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/9e2ab213-eeba-4965-9166-9e311f995990/socket.dev-malicious-ruby-gems-and-go-modules-impersonate-developer-tools-to-compromise-ci-environments-and-steal-secrets</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:52:45 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/9e2ab213-eeba-4965-9166-9e311f995990.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 01 May 2026 03:02:11 GMT</pubDate><ttl>60</ttl></channel></rss>