Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Open Source Easyjson Library Under Full Control of Russian Company

Posted on May 7, 2025May 9, 2025 By CWS

A important safety revelation has despatched shockwaves via the cybersecurity group as researchers uncovered that easyjson, a extensively adopted open-source Go package deal central to JSON serialization processes, is beneath full management of builders primarily based in Moscow who work for VK Group, one in every of Russia’s largest web conglomerates.

The library serves as a foundational element for quite a few high-profile cloud-native applied sciences together with Kubernetes, Helm, and Istio, making its international management a matter of great concern for organizations worldwide.

The invention raises alarming questions on software program provide chain safety as easyjson is deeply embedded in important infrastructure techniques throughout U.S. Authorities networks, Fortune 500 enterprises, and cornerstone Cloud Native Computing Basis initiatives.

Its specialised performance in optimizing JSON encoding and decoding has made it a necessary dependency in high-performance computing environments, significantly these requiring fast knowledge serialization for monetary platforms and analytics techniques.

Hunted Labs researchers recognized this regarding possession sample whereas conducting safety evaluation for a U.S. Authorities consumer.

Their investigation revealed that over 85% of all commits to the easyjson repository got here from Moscow-based builders affiliated with VK Group, an organization at present beneath scrutiny for its connections to Russian state safety companies and topic to numerous worldwide sanctions.

The scenario is especially troubling given VK’s documented historical past of cooperating with Kremlin directives and sharing consumer knowledge with Russian authorities.

VK Group, also referred to as Mail.ru, is managed by Russian state-owned entities via Gazprom Media and has management members who’re at present topic to each U.S. and E.U. sanctions, in response to a number of authorities sources and regulatory filings.

Safety consultants warn that this stage of international management over important infrastructure code presents a major nationwide safety vulnerability, particularly given the present geopolitical panorama and Russia’s documented historical past of cyber operations towards Western targets.

The library’s deep integration into core techniques makes it almost not possible to rapidly take away or exchange with out substantial disruption to dependent companies.

Potential Exploitation Vectors

The managed positioning of easyjson presents a number of regarding exploitation situations that safety professionals should contemplate.

As a serializer carried out within the Go language, easyjson occupies a very delicate place in utility architectures.

Whereas there isn’t any proof of present malicious exercise, the strategic placement of the library creates distinctive safety challenges.

// Instance of how easyjson generates customized marshalers
// which have deep entry to knowledge buildings
func (j *SensitiveData) MarshalJSON() ([]byte, error) {
// Customized generated code that processes all knowledge fields
// with potential for refined manipulation
return json.Marshal(&struct{
UserID string `json:”user_id”`
AuthToken string `json:”auth_token”`
PrivateData string `json:”private_data”`
}{
UserID: j.UserID,
AuthToken: j.AuthToken,
PrivateData: j.PrivateData,
})
}

The serialization and deserialization processes deal with delicate knowledge buildings that always comprise credentials, authentication tokens, and proprietary data.

A compromised JSON parser might selectively exfiltrate particular knowledge fields whereas sustaining regular utility performance, making detection extraordinarily troublesome.

Since easyjson generates Go code that handles knowledge marshaling on the byte stage, refined manipulations might introduce data leakage channels with out triggering safety alerts.

Safety researchers at Hunted Labs emphasize that the danger isn’t essentially about present code integrity however somewhat the continual trusted entry maintained by builders affiliated with entities beneath sanction.

The advisable mitigation methods embody forking and self-maintaining the library, transitioning to various JSON serialization instruments with numerous upkeep communities, or collaborating on a community-led alternative with clear governance mechanisms.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Company, Control, Critical, Easyjson, Full, Library, Open, Russian, Source

Post navigation

Previous Post: DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots
Next Post: Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025

Related Posts

Linux Kernel Patching: Preventing Exploits in 2025 Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
Microsoft Teams To Block Screen Capture During Meetings Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak
  • Why CTEM is the Winning Bet for CISOs in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak
  • Why CTEM is the Winning Bet for CISOs in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News