#reversinglabs

2025-12-17

NuGet malware targets crypto wallets, OAuth tokens

ReversingLabs discovered malicious packages on NuGet targeting the crypto ecosystem. The campaign, starting in July 2025, involved 14 packages impersonating legitimate crypto-related tools. The malware aimed to steal crypto funds by redirecting transactions or exfiltrating secrets for wallet access. Techniques used to appear trustworthy included homoglyphs, version bumping, and inflating download counts. The packages were divided into three groups: wallet stealers, crypto-funds stealers, and Google Ads OAuth stealers. This campaign highlights the ongoing exploitation of trust in the software supply chain, potentially affecting entire projects and communities relying on compromised dependencies.

Pulse ID: 69431f1d8da9595abdfc9c20
Pulse Link: otx.alienvault.com/pulse/69431
Pulse Author: AlienVault
Created: 2025-12-17 21:22:37

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Google #GoogleAds #InfoSec #Malware #NuGet #OTX #OpenThreatExchange #RAT #ReversingLabs #Rust #SupplyChain #bot #AlienVault

2025-12-03

Bootstrap script exposes PyPI to domain takeover attacks | ReversingLabs

Vulnerable code in legacy Python packages could be exposed to domain takeover attacks, according to researchers at ReversingLabs and Spectra Assure, a software supply chain security firm in London.

Pulse ID: 69304c963c1ec7b1d7a2df29
Pulse Link: otx.alienvault.com/pulse/69304
Pulse Author: CyberHunter_NL
Created: 2025-12-03 14:43:34

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #Python #ReversingLabs #SupplyChain #bot #CyberHunter_NL

2025-11-25

Build script exposes PyPI to domain takeover attacks

ReversingLabs researchers discovered vulnerable code in legacy Python packages that could enable an attack on the Python Package Index (PyPI) via a domain compromise. The vulnerability lies in bootstrap files for a build tool that installs the Python package 'distribute' and performs other tasks. When executed, the bootstrap script fetches and executes an installation script from python-distribute.org, a domain now available for sale. Affected packages include tornado, pypiserver, slapos.core, and others. The issue stems from the complex history of Python packaging tools and the failure to formally decommission the 'distribute' module. This vulnerability highlights the risks of relying on hard-coded domains and the importance of addressing code rot in open-source projects.

Pulse ID: 6924c9abb614eb03b6f6433d
Pulse Link: otx.alienvault.com/pulse/6924c
Pulse Author: AlienVault
Created: 2025-11-24 21:10:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #Python #RCE #ReversingLabs #Vulnerability #bot #AlienVault

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-08-14

🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏

Your Business Apps Are Bringing Friends You Didn't Invite

Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.

At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.

The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:

• Detect malware, tampering, and embedded secrets

• Identify #vulnerabilities and insecure practices

• Uncover undocumented network connections

• Flag #compliance risks from restricted regions

This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.

Real-world applications:

• Procurement: Auto-scan all software before deployment

• Version Monitoring: Detect unexpected behavior changes between releases

• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems

• Risk Management: Assess COTS software as part of ongoing vendor reviews

With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.

📺 Watch the video: youtu.be/pU9bHYFND7c

🎧 Listen to the podcast: brand-stories-podcast.simpleca

📖 Read the blog: itspmagazine.com/their-stories

➤ Learn more about ReversingLabs: itspm.ag/reversinglabs-v57b

✦ Catch more stories from #ReversingLabs: itspmagazine.com/directory/rev

🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust

Tech Cybersecurity Nieuwstech_cybersecurity_nieuws@mastodon.nl
2025-02-07
Richi Jenningsrichi@vmst.io
2023-08-15

#ChatGPT is wrong more than half the time—makes many conceptual errors, but sounds confident, authoritative.

So, hard to spot the errors, say researchers. In this week’s #SSBlogwatch we can’t say we’re totally surprised. For #ReversingLabs: reversinglabs.com/blog/ai-codi #AI #DevOps

Richi Jenningsrichi@vmst.io
2023-08-08
Richi Jenningsrichi@vmst.io
2023-07-25

Google employees are to be protected from themselves. In what’s being described as a pilot program, they’ll lose internet access at work and/or root privileges.

The idea is to stop break-ins by bad actors. In this week’s #SSBlogwatch we try not to imagine the horror. For #ReversingLabs: reversinglabs.com/blog/no-net-

2020-12-15

Sophos и ReversingLabs представили БД с 20 млн данных для ИБ-исследователей #SoReL-20M, #Sophos, #ReversingLabs securitylab.ru/news/514855.php twitter.com/SecurityLabnews/st

2020-04-20

Bitcoin Stealers Hide in 700+ Ruby Developer Libraries - Cybercriminals uploaded typosquatted malicious libraries to RubyGems, which contains open-source c... more: threatpost.com/bitcoin-stealer #applicationbuildingblocks #rubyprogramminglanguage #open-sourcecomponents #maliciouslibraries #bitcoinstealers #coderepository #reversinglabs #rubygems #malware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst