Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Ruby and Go Modules Target CI Environments

Malicious Ruby and Go Modules Target CI Environments

Posted on May 1, 2026 By CWS

A fresh wave of software supply chain attacks has been detected, utilizing sleeper packages to deploy harmful payloads that facilitate credential theft and tampering with GitHub Actions, ultimately establishing SSH persistence. The GitHub user ‘BufferZoneCorp’ has been identified as the source of these attacks, releasing repositories linked to compromised Ruby gems and Go modules. While these malicious packages have been removed from RubyGems and blocked in Go module repositories, their impact remains significant.

Identified Malicious Packages

The deceptive packages mimic legitimate modules to avoid detection. Ruby gems involved include ‘knot-activesupport-logger’ and ‘knot-simple-formatter,’ among others. Similarly, Go modules such as ‘go-metrics-sdk’ and ‘log-core’ were used to deceive users. These packages posed as trusted libraries like ‘activesupport-logger’ and ‘grpc-client’ to trick developers into downloading them.

Impact on Developers and CI Environments

The attack targets developers and continuous integration (CI) environments across multiple platforms. Ruby gems were engineered to steal sensitive information during installation, targeting environment variables and critical credentials such as SSH keys and AWS secrets. Stolen data was sent to an attacker-controlled endpoint for exploitation.

In contrast, the Go modules possessed more extensive abilities, including tampering with GitHub Actions workflows and inserting unauthorized SSH keys for remote access. These modules executed through the ‘init()’ function, manipulating environment variables and injecting fake Go executables to influence workflow execution without detection.

Recommendations for Affected Users

Users who have inadvertently installed these packages should take immediate action. It is essential to remove the compromised packages, check for unauthorized access to sensitive files, rotate any exposed credentials, and scrutinize network activity for suspicious outbound traffic. Keeping systems secure involves vigilance and prompt response to such threats.

As these attacks highlight vulnerabilities in software supply chain security, it is crucial for developers and organizations to maintain robust security practices, ensuring the integrity of their software environments.

The Hacker News Tags:CI pipelines, credential theft, Cybersecurity, GitHub actions, Go modules, Malware, Ruby gems, sleeper packages, SSH persistence, supply chain attack

Post navigation

Previous Post: Fake CAPTCHA Scam Inflates Phone Bills via SMS Fraud
Next Post: Cisco Introduces Open Source AI Provenance Tool

Related Posts

295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage The Hacker News
Beware the Hidden Risk in Your Entra Environment Beware the Hidden Risk in Your Entra Environment The Hacker News
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities The Hacker News
PowMix Botnet Targets Czech Workforce with Stealth Tactics PowMix Botnet Targets Czech Workforce with Stealth Tactics The Hacker News
Reducing Attack Surface: Key Strategies Explained Reducing Attack Surface: Key Strategies Explained The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Experts Jailed for Ransomware Conspiracy Involvement
  • Overcoming Key Sales Obstacles in Cybersecurity for MSPs
  • Global Ransomware Cases Surge as AI Tools Enhance Attacks
  • Cisco Introduces Open Source AI Provenance Tool
  • Malicious Ruby and Go Modules Target CI Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Experts Jailed for Ransomware Conspiracy Involvement
  • Overcoming Key Sales Obstacles in Cybersecurity for MSPs
  • Global Ransomware Cases Surge as AI Tools Enhance Attacks
  • Cisco Introduces Open Source AI Provenance Tool
  • Malicious Ruby and Go Modules Target CI Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark