Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Rust Crates and AI Bot Threaten Developer Secrets

Malicious Rust Crates and AI Bot Threaten Developer Secrets

Posted on March 11, 2026 By CWS

Cybersecurity experts have recently uncovered a cyber threat involving five Rust crates that disguise themselves as time-related utilities to siphon sensitive .env file data. These malicious packages were made available on crates.io, and include the following names: chrono_anchor, dnp3times, time_calibrator, time_calibrators, and time-sync.

Unmasking the Threat

Published between late February and early March 2026, these crates mimic the timeapi.io service. The consensus among analysts is that a single threat actor is behind this operation, using a consistent exfiltration method and a deceptive domain, “timeapis[.]io,” to collect the stolen data. According to security researcher Kirill Boychenko, the primary function of these crates is to steal credentials and secrets from developer environments, particularly targeting .env files.

While most of these packages simply exfiltrate data, “chrono_anchor” employs obfuscation techniques to evade detection. The package includes exfiltration logic in a file named “guard.rs,” triggered by an “optional sync” function, making it less suspicious to developers. Unlike traditional malware, this code does not establish persistence on the host; rather, it repeatedly exfiltrates .env secrets whenever the malicious code is called during a Continuous Integration (CI) workflow.

Implications for Developers

These .env files typically store API keys, tokens, and other sensitive information, enabling attackers to compromise downstream users and gain extensive access to environments, including cloud services and databases. Although these packages have been removed from crates.io, developers who downloaded them are advised to rotate keys and tokens, audit CI/CD jobs, and restrict network access to mitigate potential damage.

Socket, a security firm, emphasized the significance of this campaign, highlighting that even low-complexity supply chain malware can have a substantial impact when executed within developer workspaces and CI jobs. Therefore, users are encouraged to implement controls that can prevent malicious dependencies from executing.

AI Bot Exploitation of GitHub Actions

The discovery of these Rust crates coincides with the identification of an AI-powered bot, “hackerbot-claw,” which exploits CI/CD pipelines across major open-source repositories. This bot scans public repositories for vulnerable GitHub Actions workflows to extract developer secrets. Between February 21 and February 28, 2026, it targeted repositories from companies like Microsoft, Datadog, and Aqua Security.

The attack process involves scanning repositories for misconfigured pipelines, forking the target repository, and preparing a malicious payload. The bot then opens a pull request with a minor change, such as a typo correction, while concealing the main payload in the branch name or CI script. This tactic triggers the CI pipeline, executing the malicious code on the build server and stealing secrets and access tokens.

Among the highest-profile attacks was on Aqua Security’s “aquasecurity/trivy” repository. The bot exploited a pull_request_target workflow to steal a Personal Access Token (PAT), which was then used to compromise the repository.

Preventive Measures and Future Outlook

Aqua Security’s incident response team has since removed the compromised artifacts and revoked the credentials used to publish them. They advise users to uninstall the affected extensions, check for unexpected repositories, and rotate environment secrets. This incident is being tracked under the CVE identifier CVE-2026-28353.

To prevent similar threats, systems must ensure that specific conditions are met, such as having only the necessary versions installed, limiting permissions, and securing access to sensitive data. The progression from version 1.8.12 to 1.8.13 of the compromised software highlights an iterative approach by attackers to refine their exfiltration methods. Developers and organizations must remain vigilant and adopt robust security practices to safeguard their environments from such evolving threats.

The Hacker News Tags:AI bot, Automation, CI/CD pipelines, continuous integration, Cybersecurity, developer secrets, developer tools, environment variables, GitHub, GitHub actions, Malware, Open Source, Rust crates, Security, supply chain

Post navigation

Previous Post: Critical SQL Server Flaw Enables Privilege Escalation
Next Post: Critical Gogs Flaw Allows Silent Overwriting of LFS Objects

Related Posts

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News
WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens The Hacker News
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts The Hacker News
Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs The Hacker News
Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BlackSanta Malware Disables Security Before Attack
  • Microsoft Fixes 84 Security Flaws, Including Two Zero-Days
  • UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
  • Critical Microsoft .NET Vulnerability Demands Immediate Attention
  • Siemens and Schneider Lead ICS Patch Tuesday Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BlackSanta Malware Disables Security Before Attack
  • Microsoft Fixes 84 Security Flaws, Including Two Zero-Days
  • UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
  • Critical Microsoft .NET Vulnerability Demands Immediate Attention
  • Siemens and Schneider Lead ICS Patch Tuesday Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News