Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Ruby and Go Modules Target CI Environments

Malicious Ruby and Go Modules Target CI Environments

Posted on May 1, 2026 By CWS

A fresh wave of software supply chain attacks has been detected, utilizing sleeper packages to deploy harmful payloads that facilitate credential theft and tampering with GitHub Actions, ultimately establishing SSH persistence. The GitHub user ‘BufferZoneCorp’ has been identified as the source of these attacks, releasing repositories linked to compromised Ruby gems and Go modules. While these malicious packages have been removed from RubyGems and blocked in Go module repositories, their impact remains significant.

Identified Malicious Packages

The deceptive packages mimic legitimate modules to avoid detection. Ruby gems involved include ‘knot-activesupport-logger’ and ‘knot-simple-formatter,’ among others. Similarly, Go modules such as ‘go-metrics-sdk’ and ‘log-core’ were used to deceive users. These packages posed as trusted libraries like ‘activesupport-logger’ and ‘grpc-client’ to trick developers into downloading them.

Impact on Developers and CI Environments

The attack targets developers and continuous integration (CI) environments across multiple platforms. Ruby gems were engineered to steal sensitive information during installation, targeting environment variables and critical credentials such as SSH keys and AWS secrets. Stolen data was sent to an attacker-controlled endpoint for exploitation.

In contrast, the Go modules possessed more extensive abilities, including tampering with GitHub Actions workflows and inserting unauthorized SSH keys for remote access. These modules executed through the ‘init()’ function, manipulating environment variables and injecting fake Go executables to influence workflow execution without detection.

Recommendations for Affected Users

Users who have inadvertently installed these packages should take immediate action. It is essential to remove the compromised packages, check for unauthorized access to sensitive files, rotate any exposed credentials, and scrutinize network activity for suspicious outbound traffic. Keeping systems secure involves vigilance and prompt response to such threats.

As these attacks highlight vulnerabilities in software supply chain security, it is crucial for developers and organizations to maintain robust security practices, ensuring the integrity of their software environments.

The Hacker News Tags:CI pipelines, credential theft, Cybersecurity, GitHub actions, Go modules, Malware, Ruby gems, sleeper packages, SSH persistence, supply chain attack

Post navigation

Previous Post: Fake CAPTCHA Scam Inflates Phone Bills via SMS Fraud
Next Post: Cisco Introduces Open Source AI Provenance Tool

Related Posts

Critical nginx-ui Flaw Allows Full Server Control Critical nginx-ui Flaw Allows Full Server Control The Hacker News
Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release The Hacker News
Cybersecurity Updates: Microsoft, Zerion Breaches, and More Cybersecurity Updates: Microsoft, Zerion Breaches, and More The Hacker News
AISURU Botnet Orchestrates Unprecedented 31.4 Tbps DDoS Attack AISURU Botnet Orchestrates Unprecedented 31.4 Tbps DDoS Attack The Hacker News
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale The Hacker News
Cellebrite Technology Utilized on Kenyan Activist’s Phone Cellebrite Technology Utilized on Kenyan Activist’s Phone The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Python-Based Malware Deep#Door Targets Windows
  • Cyber Experts Sentenced for BlackCat Ransomware Crimes
  • New Python Malware DEEP#DOOR Targets Windows Systems
  • US Experts Jailed for Ransomware Conspiracy Involvement
  • Overcoming Key Sales Obstacles in Cybersecurity for MSPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Python-Based Malware Deep#Door Targets Windows
  • Cyber Experts Sentenced for BlackCat Ransomware Crimes
  • New Python Malware DEEP#DOOR Targets Windows Systems
  • US Experts Jailed for Ransomware Conspiracy Involvement
  • Overcoming Key Sales Obstacles in Cybersecurity for MSPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark