Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Open Source Easyjson Library Under Full Control of Russian Company

Posted on May 7, 2025May 9, 2025 By CWS

A important safety revelation has despatched shockwaves via the cybersecurity group as researchers uncovered that easyjson, a extensively adopted open-source Go package deal central to JSON serialization processes, is beneath full management of builders primarily based in Moscow who work for VK Group, one in every of Russia’s largest web conglomerates.

The library serves as a foundational element for quite a few high-profile cloud-native applied sciences together with Kubernetes, Helm, and Istio, making its international management a matter of great concern for organizations worldwide.

The invention raises alarming questions on software program provide chain safety as easyjson is deeply embedded in important infrastructure techniques throughout U.S. Authorities networks, Fortune 500 enterprises, and cornerstone Cloud Native Computing Basis initiatives.

Its specialised performance in optimizing JSON encoding and decoding has made it a necessary dependency in high-performance computing environments, significantly these requiring fast knowledge serialization for monetary platforms and analytics techniques.

Hunted Labs researchers recognized this regarding possession sample whereas conducting safety evaluation for a U.S. Authorities consumer.

Their investigation revealed that over 85% of all commits to the easyjson repository got here from Moscow-based builders affiliated with VK Group, an organization at present beneath scrutiny for its connections to Russian state safety companies and topic to numerous worldwide sanctions.

The scenario is especially troubling given VK’s documented historical past of cooperating with Kremlin directives and sharing consumer knowledge with Russian authorities.

VK Group, also referred to as Mail.ru, is managed by Russian state-owned entities via Gazprom Media and has management members who’re at present topic to each U.S. and E.U. sanctions, in response to a number of authorities sources and regulatory filings.

Safety consultants warn that this stage of international management over important infrastructure code presents a major nationwide safety vulnerability, particularly given the present geopolitical panorama and Russia’s documented historical past of cyber operations towards Western targets.

The library’s deep integration into core techniques makes it almost not possible to rapidly take away or exchange with out substantial disruption to dependent companies.

Potential Exploitation Vectors

The managed positioning of easyjson presents a number of regarding exploitation situations that safety professionals should contemplate.

As a serializer carried out within the Go language, easyjson occupies a very delicate place in utility architectures.

Whereas there isn’t any proof of present malicious exercise, the strategic placement of the library creates distinctive safety challenges.

// Instance of how easyjson generates customized marshalers
// which have deep entry to knowledge buildings
func (j *SensitiveData) MarshalJSON() ([]byte, error) {
// Customized generated code that processes all knowledge fields
// with potential for refined manipulation
return json.Marshal(&struct{
UserID string `json:”user_id”`
AuthToken string `json:”auth_token”`
PrivateData string `json:”private_data”`
}{
UserID: j.UserID,
AuthToken: j.AuthToken,
PrivateData: j.PrivateData,
})
}

The serialization and deserialization processes deal with delicate knowledge buildings that always comprise credentials, authentication tokens, and proprietary data.

A compromised JSON parser might selectively exfiltrate particular knowledge fields whereas sustaining regular utility performance, making detection extraordinarily troublesome.

Since easyjson generates Go code that handles knowledge marshaling on the byte stage, refined manipulations might introduce data leakage channels with out triggering safety alerts.

Safety researchers at Hunted Labs emphasize that the danger isn’t essentially about present code integrity however somewhat the continual trusted entry maintained by builders affiliated with entities beneath sanction.

The advisable mitigation methods embody forking and self-maintaining the library, transitioning to various JSON serialization instruments with numerous upkeep communities, or collaborating on a community-led alternative with clear governance mechanisms.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Company, Control, Critical, Easyjson, Full, Library, Open, Russian, Source

Post navigation

Previous Post: DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots
Next Post: Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025

Related Posts

Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
Chinese Agent Impersonates as Stanford Student For Intelligence Gathering Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News