<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>ReversingLabs Blog</title>
    <link>https://www.reversinglabs.com/blog</link>
    <description />
    <language>en</language>
    <pubDate>Wed, 21 Feb 2024 15:33:26 GMT</pubDate>
    <dc:date>2024-02-21T15:33:26Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>4 ways hero culture is killing your security program's effectiveness</title>
      <link>https://www.reversinglabs.com/blog/4-ways-hero-culture-is-killing-your-organizations-security-program</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/4-ways-hero-culture-is-killing-your-organizations-security-program" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/cybersecurity-hero-culture.jpg" alt="4 ways hero culture is killing your organization's cybersecurity posture" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Who doesn't love a good hero? In the movies, when the hero swoops in and averts disaster, they receive copious accolades, everyone's satisfied, and the credits roll. In the sequels, new disaster scenarios that no one planned for unfold, but the hero is as fresh and ready as ever to repeat the cycle, singlehandedly taking on the challenge du jour.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/cybersecurity-hero-culture.jpg?width=1400&amp;amp;height=732&amp;amp;name=cybersecurity-hero-culture.jpg" width="1400" height="732" alt="cybersecurity-hero-culture" style="height: auto; max-width: 100%; width: 1400px;"&gt;Who doesn't love a good hero? In the movies, when the hero swoops in and averts disaster, they receive copious accolades, everyone's satisfied, and the credits roll. In the sequels, new disaster scenarios that no one planned for unfold, but the hero is as fresh and ready as ever to repeat the cycle, singlehandedly taking on the challenge du jour.&lt;/p&gt;  
&lt;p&gt;In cybersecurity, however, the story is more nuanced — and less cheery. In the trenches of cybersecurity, the hero is often burned out after running around fixing other people's problems. And that leads to them making more mistakes than saves, because they've run out of superhero strength to do anything well anymore. Every time they do fix something, the accolades are few, but the demands increase — while the resources decrease.&lt;/p&gt; 
&lt;p&gt;Does this sound familiar — and maybe even strike a nerve? While security hero culture is born from good intentions, it is doing more harm than good to companies — and to the health and well-being of the security heroes themselves. Top experts believe that if organizations are going to improve their security posture, they must acknowledge the problems with hero culture and launch a multifaceted effort to overcome it.&lt;/p&gt; 
&lt;p&gt;Here's why cybersecurity hero culture is a problem — and four examples of how companies and the industry can avoid its negative effects and develop more resilient security operations.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Key takeaways: &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt; | Get the &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;full report&lt;/a&gt; | See the &lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;Webinar discussion&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;The toxic nature of cybersecurity hero culture&lt;/h2&gt; 
&lt;p&gt;Ali Khan, field CISO at ReversingLabs, suggests a quick gut check: Ask, "Does my security organization put personalities over process?" If the answer is yes, that's a red flag that your organization could be in in the throes of hero culture.&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;"This happens when you rely more on a person than you do on a good, solid process, where you trust the process and everyone in the team to act according to it. Here's a very simple example: Each time a midsize organization has some kind of cyber-incident, are people in the business most likely to email a specific person about it, or do they email security@organization.com?"&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/alinkhan-ciso/"&gt;Ali Khan&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;Security leaders have been exploring the toxicity of cybersecurity hero culture for a while, spotlighting that it could be hurting organizations' cybersecurity outcomes. Some recent examples:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Meta's Ryan Nakamoto:&lt;/span&gt; "&lt;a href="https://naksecurity.medium.com/the-detriments-of-hero-culture-3fc455963d6e"&gt;The Detriments of Hero Culture"&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Google's Anton Chuvakin:&lt;/span&gt; "&lt;a href="https://medium.com/anton-on-security/how-to-banish-heroes-from-your-soc-671bbd204714"&gt;How to Banish Heroes from Your SOC"&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Security veteran George Sandford:&lt;/span&gt; "&lt;a href="https://www.youtube.com/watch?v=eanu7Jf_7QY"&gt;Don't Get Tangled Up in Your Cape: Hero Culture As a Negative Force in Cyber"&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;a href="https://ventureinsecurity.net/p/hero-culture-in-cybersecurity-origins"&gt;One of the most comprehensive explorations on the topic to date&lt;/a&gt; was a recent in-depth examination of where security hero culture comes from, why it's hurting security professionals and security performance, and why management is disincentivized to stop it.&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;Application security (AppSec) veteran Kymberlee Price, founder and CEO of Zatik, who wrote the piece with Ross Haleliuk, head of product for LimaCharlie, said in an interview about the piece that the problem is clear: "&lt;/span&gt;&lt;span style="color: black;"&gt;It feels good to be a hero." However, hero culture leads to a counterproductive outcome.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="padding-left: 40px;"&gt;&lt;span style="color: black;"&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"[If] you take it to the extreme, it can be incredibly detrimental for both the people and the companies. And that's the conversation we're trying to start, which is, How do we not only make sure that the security workers are healthy and sustainable, but in a way that's better for the companies?"&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/kymberleeprice/"&gt;Kymberlee Price&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Haleliuk and Price's takedown of hero culture gauges the pain being felt in organization's today as cyberattacks ramp up generally — and as &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;software supply chain security becomes front and center for organizations. &lt;/a&gt;Kelly Shortridge, a longtime product security advocate and senior principal engineer in the office of the CTO at Fastly, recently took on a related issue with software engineering, in a post titled "&lt;a href="https://kellyshortridge.com/blog/posts/cybersecurity-isnt-special/"&gt;Cybersecurity Isn't Special&lt;/a&gt;." In it, she rails against "power-tripping" cybersecurity programs and professionals that treat security concerns as separate from the whole — to the detriment of the outcome.&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;"[Security] can’t pretend like security failure is so distinct in importance and impact that it requires completely separate workflows, stacks, reviews, tooling, design, and basically everything else. We &lt;/em&gt;should&lt;em&gt; care about cybersecurity but we should not silo it or treat its concerns as separate because it actually worsens the outcomes we purportedly care about long-term."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/kellyshortridge/"&gt;Kelly Shortridge&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;4 problems stemming from hero culture&lt;/h2&gt; 
&lt;p&gt;When you boil down the issues that all these thought leaders bring up about cybersecurity hero culture, certain themes start to emerge across all those talking points. Foremost among them is that when cybersecurity hero mentality prevails, the following consequences ripple out from that culture:&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;1. The risk prioritization anti-pattern&lt;/h2&gt; 
&lt;p&gt;One of the biggest dangers of cybersecurity hero culture is the underlying drumbeat of perfectionism that drives those in its thrall.&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;span style="color: black;"&gt;&lt;em&gt;"We see this happen in a lot of places where it's like you feel like, as a security leader, you have to be perfect and you have to save every person from every crime. We simply can't do that."&lt;/em&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;—Kymberlee Price&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;Succumbing to the perfectionist mindset puts security teams into the anti-pattern of sound risk management. Whereas risk management is all about prioritizing risks because there's no such thing as a risk-free environment, hero culture tends to get caught up in the snipe hunt of risk elimination.&lt;/span&gt;&lt;span style="color: black;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;This is where the storyline links up with the security exceptionalism problem highlighted by Fastly's Shortridge in her recent post. Security practitioners become gatekeepers when they start to believe they can eliminate every threat. And that's exactly when they're most likely elevate cyber-risks above all the other risks the business must consider: business risks, speed to market risks, software resiliency risks, etc.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"Reliability failures are arguably both more frequent and more damaging when they occur; developer productivity failures can mean the difference between successful market differentiation and losing market share."&lt;br&gt;—Kelly Shortridge&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;2. Burnout begets burnout&lt;/h2&gt; 
&lt;p&gt;Security burnout is one of the biggest mental health and productivity issues in the industry today — and the experts believe that hero culture is a huge contributor to the problem. The harder security heroes are worked, the less headspace they have to come up with creative ways to address root causes to problems and help the business build security by design.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"If you're grabbing all the dropping balls and throwing them back up in the air, then you don't have time to take a step back and think creatively about secure design, or 'How do we partner with the architects to develop this more securely?' because you're so busy trying to patch up the last thing that got shipped. If we continue this hero culture, the burnout cycle continues."&lt;br&gt;&lt;span style="font-size: 24px;"&gt;—Kymberlee Price&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;3. Cybersecurity's free-rider problem in reverse&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;The burnout cycle is also self-perpetuating because the business managing the heroes expects — implicitly and explicitly — that these passionate workers will always put in the extra hours to get things done. Which means they can get away with understaffing the security teams. It's like the &lt;a href="https://en.wikipedia.org/wiki/Free-rider_problem"&gt;free-rider problem&lt;/a&gt; in reverse. "I think being passionate about your profession is great. Trying to do your very best and having that drive to overdeliver. Having that drive to spend your free time to learn more about the things you're passionate about is great," said LimaCharlie's Haleliuk. &lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"The problem becomes when companies see it [but are] incentivized to exploit that passion, to double down on that passion, and to underinvest in their security operations because they know that there are people on their teams who have the desire to do the best they can, and they know that they'll step in and cover up for the gaps and goals the organization just lets persist by design."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/rosshaleliuk/"&gt;Ross Haleliuk&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="font-size: 24px;"&gt;4. Lone rangers aren't team players&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;The most fundamental problem with hero culture is that it kills so many chances for effective teamwork. Heroes tend to work in isolation. Even when a security leader can put together a team of heroes, they're still working in isolation of the rest of the business, which means you lose the chance for cross-disciplinary excellence.&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;As long as companies continue to believe that they are making the best business decisions by doing what they're doing today, they won't change, ReversingLabs' Khan said.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;&lt;span style="font-size: 24px;"&gt;"I've worked with a lot of people who are really good at what they do and are specialists, and so that provides a really good advantage, but it doesn't really help in a team culture environment because cybersecurity is a team sport and software development is very much a team sport. It's really hard for engineers, pen testers, security orchestrators, playbook builders, architects, and overall solution managers to work with a superhero. Someone with that mentality can put a damper on the team because their teammates sometimes step aside and take less responsibility."&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 24px;"&gt;—Ali Khan&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;Process over personalities&lt;/h2&gt; 
&lt;p&gt;Hero culture is hurting both AppSec and SecOps in a lot of ways. So how does the industry fix this problem? Price and Haleliuk argue that many practitioners are addicted to the habit of heroic overwork — and the intermittent dopamine rewards they get when they do manage to save the day.&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;"The &lt;span style="color: black;"&gt;employees who say, 'I'm going to break out of the security hero model,' they have to detox just like somebody trying to give up a gambling addiction. That habit of constantly thinking about work takes time to break. And that won't break without cultural support at work, without a boss being like, 'Hey, why are you online on the weekends? I don't expect you to be online on the weekends. What'd you do this weekend that was fun?'"&lt;br&gt;&lt;span style="font-size: 24px;"&gt;—Kymberlee Price&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;When that kind of support is lacking, setting boundaries against managerial expectations of heroism can threaten your career track. Price points out that people who read her and Haleliuk's piece and decide to set boundaries at work and put in no more than 45 to 50 hours per week could end up losing their job if their employer isn't on board with that. &lt;br&gt;&lt;br&gt;That is why Price thinks the industry needs to find ways to collect data and research that shows how burnout affects security outcomes and that measure what realistic work scoping looks like in a security operations center (SOC) and other parts of the security team.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;Haleliuk noted that, to truly move business leaders, studies would have to demonstrate how poor outcomes detrimentally affect the bottom line, but he isn't optimistic that the industry will be able to find that.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;span style="color: black;"&gt;"As long as companies&amp;nbsp;continue to believe that they are making the best business decisions by doing what they're doing today, I don't anticipate they will be incentivized to change."&lt;br&gt;&lt;em&gt;—Ross Haleliuk&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;Khan said individuals and security managers can make a dent at their own organizations if they start recognizing the power of processes over personalities. This goes for SOC incident response as much as for creating less-risky software development patterns.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"What we really need is good, solid processes and playbooks and crisis communication plans — and we've really got to follow those plans."&lt;br&gt;—Ali Khan&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F4-ways-hero-culture-is-killing-your-organizations-security-program&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Operations</category>
      <pubDate>Wed, 21 Feb 2024 14:00:00 GMT</pubDate>
      <author>ericka@chickowski.com (Ericka Chickowski)</author>
      <guid>https://www.reversinglabs.com/blog/4-ways-hero-culture-is-killing-your-organizations-security-program</guid>
      <dc:date>2024-02-21T14:00:00Z</dc:date>
    </item>
    <item>
      <title>Attackers leverage PyPI to sideload malicious DLLs</title>
      <link>https://www.reversinglabs.com/blog/attackers-leverage-pypi-to-sideload-malicious-dlls</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/attackers-leverage-pypi-to-sideload-malicious-dlls" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Attackers-leverage-PyPI-to-sideload-malicious-DLLs.webp" alt="Attackers leverage PyPI to sideload malicious DLLs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;ReversingLabs researchers have observed a clear trend in which open-source platforms and code have become the stage for a growing and diverse range of malicious activity and campaigns. This trend includes hosting malicious command-and-control (C2) infrastructure, &lt;a href="https://www.reversinglabs.com/blog/gitgot-cybercriminals-using-github-to-store-stolen-data"&gt;&lt;span&gt;storing stolen data,&lt;/span&gt;&lt;/a&gt; and delivering second- and third- stage malware including downloaders and rootkit programs. The team's most recent discovery suggests that trend is continuing in 2024.&amp;nbsp;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;On January 10, ReversingLabs reverse engineer Karlo Zanki discovered two suspicious packages on the open-source package manager Python Package Index (PyPI). The packages, &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper&lt;/em&gt;, were observed &lt;a href="https://www.reversinglabs.com/glossary/dll-sideloading"&gt;using DLL sideloading, a well-documented technique&lt;/a&gt; that malicious actors use to execute code without attracting the attention of security monitoring tools.&amp;nbsp;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;The latest discovery is an example of DLL sideloading executed by an open-source package that suggests the scope of software supply chain threats is expanding. Here is how the two packages were discovered — and key implications for both development teams and end-users.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;&lt;span style="color: #000000;"&gt;Discussion&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;One of the biggest challenges to developers who rely on open source code (and that is pretty much every developer) is assessing the quality and reliability of what they find online. The open-source ecosystem is vast and diverse, with a constantly shifting landscape made up of new software modules and actively managed code, not to mention the long, long tail of loosely managed, inactive, or obsolete open source code. Complicating matters for developers, there is no common identity or reputation provider for open-source modules. That makes it easy for malicious actors, with minimum effort, to insert themselves and their wares into otherwise legitimate software supply chains.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;As ReversingLabs has documented, typosquatting and repojacking attacks are two common methods of doing this, with malicious actors floating malicious look-alike packages for active or abandoned open-source modules in the hopes of fooling developers into incorporating them into their applications. But there are even more subtle ways to infiltrate legitimate applications, as ReversingLabs' latest discovery shows.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;This discovery happened as a result of our standard monitoring of open-source repositories for packages with specific combinations of suspicious behaviors. In this case, our platform was looking for network communication features hidden in the &lt;em&gt;setup.py&lt;/em&gt; file. That scan turned up the two malicious PyPI packages, &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper. &lt;/em&gt;With further investigation, it became clear that the targets of those files were two existing, legitimate PyPI packages: &lt;em&gt;NP6HelperHttp&lt;/em&gt; and &lt;em&gt;NP6HelperConfig&lt;/em&gt;. These are helper tools originally published by a PyPI developer with the &lt;a href="https://pypi.org/user/NP6/"&gt;&lt;span&gt;username NP6&lt;/span&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;If that name sounds familiar, it is because NP6 is also a &lt;a href="https://www.chapsvision.com/marketing-automation/"&gt;&lt;span&gt;marketing-automation tool &lt;/span&gt;&lt;/a&gt;developed by the firm Chapvision. However, the NP6 PyPI account is not an official Chapvision account. Instead, it is a personal account linked to a Chapvision developer. It is unclear whether the company was aware of the existence of that account or the &lt;em&gt;NP6HelperHttp &lt;/em&gt;and &lt;em&gt;NP6HelperConfig &lt;/em&gt;tools. However, when informed about the existence of the packages, Chapvision confirmed to ReversingLabs that the helper tools were published by one of their employees. Around the same time, those packages were removed from PyPI.&lt;/p&gt; 
&lt;p&gt;The malicious packages uncovered, &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper&lt;/em&gt;, employ typosquatting, using names that are nearly identical to one of the legitimate NP6 packages. The goal is to fool developers into downloading and opening the malicious wares, thereby facilitating further attacker access, as explained below. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;span style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0);"&gt;Zanki &lt;/span&gt;said the blurring of lines that separate official from unofficial or even malicious packages poses a major challenge to development organizations.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Attackers-leverage-PyPI-to-sideload-malicious-DLLs.webp?width=1400&amp;amp;height=732&amp;amp;name=Attackers-leverage-PyPI-to-sideload-malicious-DLLs.webp" width="1400" height="732" alt="Attackers leverage PyPI to sideload malicious DLLs" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;span style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0);"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;ReversingLabs researchers have observed a clear trend in which open-source platforms and code have become the stage for a growing and diverse range of malicious activity and campaigns. This trend includes hosting malicious command-and-control (C2) infrastructure, &lt;a href="https://www.reversinglabs.com/blog/gitgot-cybercriminals-using-github-to-store-stolen-data"&gt;&lt;span&gt;storing stolen data,&lt;/span&gt;&lt;/a&gt; and delivering second- and third- stage malware including downloaders and rootkit programs. The team's most recent discovery suggests that trend is continuing in 2024.&amp;nbsp;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;span style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0);"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;On January 10, ReversingLabs reverse engineer Karlo Zanki discovered two suspicious packages on the open-source package manager Python Package Index (PyPI). The packages, &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper&lt;/em&gt;, were observed &lt;a href="https://www.reversinglabs.com/glossary/dll-sideloading"&gt;using DLL sideloading, a well-documented technique&lt;/a&gt; that malicious actors use to execute code without attracting the attention of security monitoring tools.&amp;nbsp;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;span style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0);"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;The latest discovery is an example of DLL sideloading executed by an open-source package that suggests the scope of software supply chain threats is expanding. Here is how the two packages were discovered — and key implications for both development teams and end-users.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;&lt;span style="color: #000000;"&gt;Discussion&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;One of the biggest challenges to developers who rely on open source code (and that is pretty much every developer) is assessing the quality and reliability of what they find online. The open-source ecosystem is vast and diverse, with a constantly shifting landscape made up of new software modules and actively managed code, not to mention the long, long tail of loosely managed, inactive, or obsolete open source code. Complicating matters for developers, there is no common identity or reputation provider for open-source modules. That makes it easy for malicious actors, with minimum effort, to insert themselves and their wares into otherwise legitimate software supply chains.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;As ReversingLabs has documented, typosquatting and repojacking attacks are two common methods of doing this, with malicious actors floating malicious look-alike packages for active or abandoned open-source modules in the hopes of fooling developers into incorporating them into their applications. But there are even more subtle ways to infiltrate legitimate applications, as ReversingLabs' latest discovery shows.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;This discovery happened as a result of our standard monitoring of open-source repositories for packages with specific combinations of suspicious behaviors. In this case, our platform was looking for network communication features hidden in the &lt;em&gt;setup.py&lt;/em&gt; file. That scan turned up the two malicious PyPI packages, &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper. &lt;/em&gt;With further investigation, it became clear that the targets of those files were two existing, legitimate PyPI packages: &lt;em&gt;NP6HelperHttp&lt;/em&gt; and &lt;em&gt;NP6HelperConfig&lt;/em&gt;. These are helper tools originally published by a PyPI developer with the &lt;a href="https://pypi.org/user/NP6/"&gt;&lt;span&gt;username NP6&lt;/span&gt;&lt;/a&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;If that name sounds familiar, it is because NP6 is also a &lt;a href="https://www.chapsvision.com/marketing-automation/"&gt;&lt;span&gt;marketing-automation tool &lt;/span&gt;&lt;/a&gt;developed by the firm Chapvision. However, the NP6 PyPI account is not an official Chapvision account. Instead, it is a personal account linked to a Chapvision developer. It is unclear whether the company was aware of the existence of that account or the &lt;em&gt;NP6HelperHttp &lt;/em&gt;and &lt;em&gt;NP6HelperConfig &lt;/em&gt;tools. However, when informed about the existence of the packages, Chapvision confirmed to ReversingLabs that the helper tools were published by one of their employees. Around the same time, those packages were removed from PyPI.&lt;/p&gt; 
&lt;p&gt;The malicious packages uncovered, &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper&lt;/em&gt;, employ typosquatting, using names that are nearly identical to one of the legitimate NP6 packages. The goal is to fool developers into downloading and opening the malicious wares, thereby facilitating further attacker access, as explained below. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 1.8rem;"&gt;&lt;span style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0);"&gt;Zanki &lt;/span&gt;said the blurring of lines that separate official from unofficial or even malicious packages poses a major challenge to development organizations.&lt;/span&gt;&lt;/p&gt;  
&lt;blockquote&gt; 
 &lt;p style="padding-left: 40px;"&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;“Development organizations need to be aware of the threats related to supply chain security and open-source package repositories. They also need to be proactive about supply chain security. Even if they are not using open-source package repositories, that doesn't mean that threat actors won't abuse them to impersonate companies and their software products and tools."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/karlo-zanki-b8a2341a5/"&gt;Karlo Zanki&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;Several open-source package repositories offer features to counter issues such as the one raised by the NP6 account. For example, both the npm and NuGet package managers allow publishers to register package or username prefixes (such as NP6) without the need to publish any content. That can prevent easy impersonation attacks that float malicious packages. “Think of it like registering a domain name, to prevent others from registering it before you," Zanki said.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Malicious script abusing DLL sideloading&lt;/h2&gt; 
&lt;p&gt;Close examination of the malicious packages by ReversingLabs revealed that both contain a &lt;em&gt;setup.py&lt;/em&gt; script, which extends &lt;em&gt;setuptools &lt;/em&gt;commands with custom code designed to download two files:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;em&gt;ComServer.exe&lt;/em&gt;, a legitimate file from Beijing-based Kingsoft Corp., and properly signed with a valid certificate belonging to the same company.&lt;/li&gt; 
 &lt;li&gt;&lt;em&gt;dgdeskband64.dll&lt;/em&gt;, a malicious file that downloads and runs a stage-two payload.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/pypi-blog-figure-1.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/pypi-blog-figure-1.webp?width=1400&amp;amp;name=pypi-blog-figure-1.webp" alt="setup.py" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center; font-weight: bold; font-size: 16px;"&gt;Figure 1: setup.py - Downloading the files&lt;/p&gt; 
&lt;p&gt;Hiding malicious code in &lt;em&gt;setup.py &lt;/em&gt;is a strategy that RL researchers have seen employed in previous attacks, &lt;a href="https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise"&gt;including a December 2023 campaign&lt;/a&gt;. In that instance, custom &lt;em&gt;setuptools&lt;/em&gt; commands were used to decode a Base64 encoded URL and fetch malicious, Base64-encoded Python commands that were then executed in a new process.&lt;br&gt;&lt;br&gt;In this latest campaign, the &lt;em&gt;setup.py&lt;/em&gt; Python script downloads the &lt;em&gt;ComServer.exe&lt;/em&gt; and &lt;em&gt;dgdeskband64.dll&lt;/em&gt; files, and then executes the signed file &lt;em&gt;ComServer.exe&lt;/em&gt; in a new process.&lt;br&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;ComServer.exe &lt;/span&gt;is a legitimate software application that is a part of the larger DriverGenius software package, a popular driver management tool. One of the purposes of &lt;span style="font-style: italic;"&gt;ComServer.exe&lt;/span&gt; is to load a library, &lt;span style="font-style: italic;"&gt;dgdeskband64.dll&lt;/span&gt;, and invoke its exported function Dllinstall, which is used to install a specified module inside the named software. The catch: The version of &lt;span style="font-style: italic;"&gt;dgdeskband64.dll&lt;/span&gt; included in the malicious packages is not the legitimate version of the library that ComServer is expecting to find on the system where it is executed. Instead, the threat actor crafted their own version of &lt;span style="font-style: italic;"&gt;dgdeskband64.dll&lt;/span&gt; to facilitate the attack, with the same &lt;span style="font-style: italic;"&gt;Dllinstall&lt;/span&gt; export function as the legitimate &lt;span style="font-style: italic;"&gt;Dgdeskband64.dll&lt;/span&gt; library.&amp;nbsp;&lt;br&gt;&lt;br&gt;As the graphic below shows, the malicious &lt;span style="font-style: italic;"&gt;dgdeskband64.dll &lt;/span&gt;contains only one exported function, rather than five.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/pypi-blog-figure-2.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/pypi-blog-figure-2.webp?width=1400&amp;amp;name=pypi-blog-figure-2.webp" alt="Different exports for the legit and malicious dll" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center; font-weight: bold; font-size: 16px;"&gt;Figure 2: Different exports for the legit and malicious dll&lt;/p&gt; 
&lt;p&gt;DLL sideloading is a well-documented hacking technique used by both cybercriminal and nation-state actors to load malicious code while evading detection. In one prominent example, the North Korea-linked Lazarus Group used DLL sideloading to replace an internal IDA Pro library, &lt;em&gt;win_fw.dll,&lt;/em&gt; with a malicious DLL to download and execute a payload.&lt;br&gt;&lt;br&gt;DLL sideloading also isn’t novel in the context of open-source software attacks. In February 2023, for example, &lt;a href="https://www.reversinglabs.com/blog/open-source-malware-sows-havoc-on-supply-chain"&gt;RL researcher Lucija Valentić wrote about her discovery of Aabquerys&lt;/a&gt;, a malicious npm package that employed typosquatting on a legitimate npm module to carry out DLL sideloading of malicious components.&lt;br&gt;&lt;br&gt;In that campaign, malicious actors targeted a Windows PE (portable executable) file, &lt;span style="font-style: italic;"&gt;wsc_proxy.exe&lt;/span&gt;, &amp;nbsp;which is known to be vulnerable to the sideloading attacks. It has been involved in a number of malware campaigns. The malicious Aabquerys package, when executed, placed a dll file named &lt;span style="font-style: italic;"&gt;wsc.dll&lt;/span&gt; with an exported function named run in the same folder as &lt;span style="font-style: italic;"&gt;wsc_proxy.exe&lt;/span&gt;. When the legitimate &lt;span style="font-style: italic;"&gt;wsc_proxy.exe&lt;/span&gt; executable is launched, it would invoke the run method from the sideloaded, malicious &lt;span style="font-style: italic;"&gt;wsc.dll&lt;/span&gt;. That DLL then downloaded a third-stage malicious component, &lt;span style="font-style: italic;"&gt;Demon.bin&lt;/span&gt;, from an external command and control site.&amp;nbsp;&lt;br&gt;&lt;br&gt;In the case of the new PyPI DLL examples, sideloading was used to avoid detection of the malicious code, as was the case with Aabquerys. Specifically, that was carried out by loading malicious code located in an unsigned (and therefore untrusted) DLL from the context of a signed PE executable. With this method the attackers lower the risk that their malicious code will be detected by security tools.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&lt;img src="https://www.reversinglabs.com/hubfs/Blog/pypi-blog-figure-3a.svg" alt="pypi-blog-figure-3a" style="margin-left: auto; margin-right: auto; display: block;"&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;&lt;br&gt;Figure 3: Malware infection stages&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;Dllinstall brings malicious functionality&lt;/h2&gt; 
&lt;p&gt;Looking closer at the various elements of this attack, it's clear that execution of the malicious code is achieved by registering an exception handler inside the &lt;em&gt;Dllinstall&lt;/em&gt; export function.&amp;nbsp;&lt;br&gt;&lt;br&gt;An exception handler is a common component of modern operating systems that manages exceptions encountered by running processes according to policies that are specific to the operating system in question. Actions could range from displaying an error message, to terminating the program generating the exception.&amp;nbsp;&lt;br&gt;&lt;br&gt;In the case of this malicious campaign, however, the exception handler is used to pass along malicious code. Specifically, after the exception handler is registered, the program enters a loop where it divides numbers until division by zero happens, causing an exception and inherently transferring the code flow to the malicious subroutine.&lt;/p&gt; 
&lt;p&gt;The subroutine then establishes a connection with an external server (hxxps://us.archive-ubuntu.top/components/an.gif?type=lastest) and downloads &lt;em&gt;an.gif. &lt;/em&gt;That action would not appear suspicious. However, the downloaded file is not a GIF file at all, but a payload file, &lt;em&gt;x86_64 shellcode&lt;/em&gt;. Once downloaded, the shellcode is streamed to memory and the execution is then redirected to it through a callback registered for the &lt;em&gt;NotifyIpInterfaceChange&lt;/em&gt; function.&amp;nbsp;&lt;br&gt;&lt;br&gt;As with DLL sideloading, this method of abusing windows APIs to execute shellcode is not new. It has been observed and documented by researchers for close to 10 years.&amp;nbsp;&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Analyzing the shellcode&lt;/h2&gt; 
&lt;p&gt;Taking a look at the shellcode in question: we can see that it is encrypted using a simple XOR encryption with a moving key (Figure 4).&lt;/p&gt; 
&lt;p style="text-align: center;"&gt;&lt;img src="https://www.reversinglabs.com/hubfs/Blog/pypi-blog-figure-3.svg" alt="Shellcode decryption routine" style="margin-left: auto; margin-right: auto; display: block;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 4: Shellcode decryption routine&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;br&gt;After decrypting it, RL discovered traces of a PE file (Figure 5). The string “MZARUH'' appears in a place where the PE magic string “&lt;em&gt;MZ\x90\x00&lt;/em&gt;” normally appears. Just that string alone is a good indicator that this is a Cobalt Strike Beacon.&lt;br&gt;&lt;br&gt;Cobalt Strike is a security tool designed for red teams to aid in their penetration testing tasks. However, as with any tool (especially the ones designed for red teams), threat actors can leverage it without investing too much effort into building similar tools themselves.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-size: 20px;"&gt;&lt;span style="font-weight: bold;"&gt;[ See Webinar: &lt;/span&gt;&lt;a href="https://register.reversinglabs.com/youve-found-cobalt-strike-on-your-network" style="font-weight: bold;"&gt;How Cobalt Strike is weaponized against organizations&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; ]&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;The portable executable (PE) file that was decrypted was located just after the decryption routine, so it starts executing it right after it gets decrypted. The reason “MZARUH” is here instead of the normal PE magic string is that the CPU is trying to execute the bytes that make up that string. Coincidentally or intentionally, the string MZARUH and the data coming after it make up valid assembly instructions which can be executed normally.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/pypi-blog-figure-5.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/pypi-blog-figure-5.webp?width=1400&amp;amp;name=pypi-blog-figure-5.webp" alt="Hex-view after decrypting and traces of a PE file" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 5: Hex-view after decrypting and traces of a PE file&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;Evidence points to a wider campaign&lt;/h2&gt; 
&lt;p&gt;Is this latest discovery a single instance or a part of a bigger campaign? The ReversingLabs Titanium Platform helps answer that question.&amp;nbsp;&lt;br&gt;&lt;br&gt;Using ReversingLabs’ YARA Retro Hunt, RL researchers looked back in time to find other packages that share characteristics with previously discovered malicious packages. Retro Hunt scans all samples uploaded to RL's Titanium Cloud over the last three months and allows organizations to match them against a specific YARA rule.&lt;br&gt;&lt;br&gt;In this case, the RL research team wrote a YARA rule to look for either the malicious C2 domain (&lt;em&gt;us.archive-ubuntu.top&lt;/em&gt;) or the headers and user-agent used to download the fake &lt;em&gt;dgdeskband64.dll&lt;/em&gt; and used that to perform a retro hunt, which turned up another sample that appears to be part of this campaign.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/pypi-blog-figure-6.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/pypi-blog-figure-6.webp?width=1400&amp;amp;name=pypi-blog-figure-6.webp" alt="A1000 retrohunt matches" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="font-weight: bold; text-align: center; font-size: 16px;"&gt;Figure 6: A1000 retrohunt matches&lt;/p&gt; 
&lt;p&gt;&lt;br&gt;This second sample that turned up in Retro Hunt is also a DLL, but it is not exploiting DriverGenius’ &lt;em&gt;ComServer.exe&lt;/em&gt; to load a DLL. Instead, it uses a different pair, including an .exe and target DLL, &lt;em&gt;windowsaccessbridge-64.dll&lt;/em&gt;. Still, the functionality is identical, and the same URL downloads the same payload as the other PyPI packages, suggesting that this sample is part of the same campaign.&amp;nbsp;&lt;br&gt;&lt;br&gt;The ReversingLabs Titanium Platform can also display the sources of analyzed samples, providing even more insight into the packages. Analyzing that data, it appears that the top level container for the second discovered sample is a zip archive that contains the .exe and target DLL, &lt;em&gt;windowsaccessbridge-64.dll&lt;/em&gt;. Similarly, using the RL platform to check the sources for the top level container yielded a Titanium Cloud Service source match: the zip file was downloaded from the web location &lt;em&gt;hxxps://cdn.0c.sk/1101012.zip.&lt;/em&gt;&lt;br&gt;&lt;br&gt;That web location has been spotted in Titanium Cloud Services previously in connection with a malicious .NET sample. That .NET sample was observed downloading a ZIP file (&lt;em&gt;hxxps://cdn.0c.sk/1101012.zip&lt;/em&gt;), which extracted an .exe file from the archive along with the malicious &lt;em&gt;windowsaccessbridge-64.dll&lt;/em&gt;. It then launched the exe, which performs DLL sideloading in an identical fashion as the &lt;em&gt;NP6HelperHttptest&lt;/em&gt; and &lt;em&gt;NP6HelperHttper&lt;/em&gt; PyPI packages that initially caught the RL research team's attention. Furthermore, the .NET sample was self signed using a certificate issued to “Sex Shop SRL” (&lt;em&gt;cert-serial:e3214c81339540a3804fca656f5aea7d&lt;/em&gt;). Data from the RL platform shows that this is not the first time this certificate was used to sign malware. In fact, ReversingLabs has samples signed with that same certificate that date as far back as June 2022.&lt;/p&gt; 
&lt;p&gt;Taken together, the data strongly supports the conclusion that the newly discovered PyPI packages are a part of the same campaign as the .NET sample, which implied that these packages are not a final act. Expect to see more malicious activity from this threat actor.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Conclusion&lt;/h2&gt; 
&lt;p&gt;As this latest discovery shows, malicious actors at all levels of sophistication are increasingly turning to open source code and related infrastructure such as package managers to further their malicious campaigns. As they develop the tools and techniques threat actors deploy are becoming more diverse.&lt;/p&gt; 
&lt;p&gt;Bad actors that might have previously turned to well-tested techniques such as spearphishing to lure their targets into installing malware are adapting their methods. Planting malware in open-source package repositories and then waiting to see who downloads and uses the compromised code is proving to be a popular choice for malicious cyber-actors, who are increasingly using subtle means to insert their malicious wares into software supply chains.&amp;nbsp;&lt;br&gt;&lt;br&gt;The emergence of DLL sideloading attacks are one clear example of this emerging attack vector. These attacks have been used for years by threat actors to increase their leverage and control within compromised environments while escaping detection, but less often seen in attacks leveraging open-source packages. This report suggests that may be changing.&amp;nbsp;&lt;br&gt;&lt;br&gt;The discovery of these two malicious PyPI packages, as well as the subsequent discovery of a larger campaign and additional, malicious packages proves that threat actors are warming to the use of DLL sideloading to further software supply chain attacks — and inflict harm on both software producers and enterprises that rely on them. Over time, that is increasing pressure on both software producers and organizations to monitor the security and integrity of their software supply chain and the software packages that flow out of that supply chain.&lt;/p&gt; 
&lt;h2&gt;Indicators of Compromise (IOCs)&lt;/h2&gt; 
&lt;p&gt;Indicators of compromise (IoCs) are forensic artifacts or evidence related to a security breach or unauthorized activity on a computer network or system. IoCs play a crucial role in cybersecurity investigations and cyber-incident response efforts, helping analysts and cybersecurity professionals identify and detect potential security incidents.&lt;br&gt;&lt;br&gt;The following IOCs were collected as part of ReversingLabs' investigation of this software supply chain campaign.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;PyPI packages:&lt;/span&gt;&lt;/p&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2; height: 200px;"&gt; 
  &lt;tbody&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; background-color: #171d38; height: 25px;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;package_name&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; background-color: #171d38; height: 25px; text-align: center;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;version&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; background-color: #171d38; height: 25px;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;SHA1&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttptest&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.1&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;1fc236e94b54d3ddc4b2afb8d44a19abd7cf0dd4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttptest&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.2&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;dfc8afe5cb7377380908064551c9555719fd28e3&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttptest&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.3&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;73ece3d738777e791035e9c0c94bf4931baf3e3a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttptest&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.4&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;e3a7098e3352fdbb5ff5991e9e10dcf3b43b1b86&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttptest&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.5&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;575bcc28998ad388c2ad2c2ebc74ba583f5c0065&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttptest&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.6&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;a1bb4531ce800515afa1357b633c73c27fa305cf&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 25px;"&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;NP6HelperHttper&lt;/td&gt; 
    &lt;td style="width: 13.1339%; padding: 6px; border: 1px solid #afc7d7; height: 25px; text-align: center;"&gt;0.1&lt;/td&gt; 
    &lt;td style="width: 53.5339%; padding: 6px; border: 1px solid #afc7d7; height: 25px;"&gt;a65bce340366f724d444978dcdcd877fa2cacb1c&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Additional Indicators:&lt;/span&gt;&lt;/p&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 99.9983%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 49.85%; padding: 6px; background-color: #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;description&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 49.85%; padding: 6px; background-color: #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;URI&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 49.85%; padding: 6px; border: 1px solid #afc7d7;"&gt;Domain that’s hosting the malicious dll&lt;/td&gt; 
    &lt;td style="width: 49.85%; padding: 6px; border: 1px solid #afc7d7;"&gt;https://fus.rngupdatem.buzz&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 49.85%; padding: 6px; border: 1px solid #afc7d7;"&gt;Domain that’s hosting the shellcode payload&lt;/td&gt; 
    &lt;td style="width: 49.85%; padding: 6px; border: 1px solid #afc7d7;"&gt;Us.archive-ubuntu.top&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; background-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;name&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style="width: 13.9339%; padding: 6px; background-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;type&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style="width: 52.7339%; padding: 6px; background-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;SHA1&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7;"&gt;dgdeskband.dll&lt;/td&gt; 
    &lt;td style="width: 13.9339%; padding: 6px; border: 1px solid #afc7d7;"&gt;PE/dll&lt;/td&gt; 
    &lt;td style="width: 52.7339%; padding: 6px; border: 1px solid #afc7d7;"&gt;1f9fcf86a56394a7267d85ba76c1256d12e3e76b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7;"&gt;windowsaccessbridge-64.dll&lt;/td&gt; 
    &lt;td style="width: 13.9339%; padding: 6px; border: 1px solid #afc7d7;"&gt;PE/dll&lt;/td&gt; 
    &lt;td style="width: 52.7339%; padding: 6px; border: 1px solid #afc7d7;"&gt;84c75536b279a85a5320f058514b884a016bc8c8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 33.3339%; padding: 6px; border: 1px solid #afc7d7;"&gt;an.gif&lt;/td&gt; 
    &lt;td style="width: 13.9339%; padding: 6px; border: 1px solid #afc7d7;"&gt;shellcode&lt;/td&gt; 
    &lt;td style="width: 52.7339%; padding: 6px; border: 1px solid #afc7d7;"&gt;2dc80f45540d0a3ea33830848fcf529f98ea2f5e&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fattackers-leverage-pypi-to-sideload-malicious-dlls&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Research</category>
      <pubDate>Tue, 20 Feb 2024 13:00:00 GMT</pubDate>
      <guid>https://www.reversinglabs.com/blog/attackers-leverage-pypi-to-sideload-malicious-dlls</guid>
      <dc:date>2024-02-20T13:00:00Z</dc:date>
      <dc:creator>Petar Kirhmajer</dc:creator>
    </item>
    <item>
      <title>Complexity and software supply chain security: 5 key survey takeaways</title>
      <link>https://www.reversinglabs.com/blog/complexity-and-software-supply-chain-security-study-5-key-takeaways</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/complexity-and-software-supply-chain-security-study-5-key-takeaways" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/esg-supply-chain-security-study-complexity.jpg" alt="Complexity and software supply chain security study: 5 key takeaways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;Organizations are struggling with software supply chain security. That fact was further exposed this month with the Enterprise Strategy Group's new study, “The Growing Complexity of Securing the Software Supply Chain.”&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/esg-supply-chain-security-study-complexity.jpg?width=1400&amp;amp;height=732&amp;amp;name=esg-supply-chain-security-study-complexity.jpg" width="1400" height="732" alt="esg-supply-chain-security-study-complexity" style="height: auto; max-width: 100%; width: 1400px;"&gt;Organizations are struggling with software supply chain security. That fact was further exposed this month with the Enterprise Strategy Group's new study, “The Growing Complexity of Securing the Software Supply Chain.”&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;The &lt;a href="https://www.prnewswire.com/news-releases/enterprise-strategy-group-research-reveals-91-percent-of-organizations-have-experienced-a-software-supply-chain-incident-in-past-12-months-302058922.html"&gt;28-page study&lt;/a&gt;, based on a survey of 368 IT, cybersecurity, and application development professionals at organizations in the United States and Canada, found that 91% of organizations have experienced a software supply chain incident in the last 12 months. The most common security incidents were zero-day exploits on vulnerabilities in third-party code (41%); misconfigured cloud service exploits (40%); open-source software and container image exploits (40%); secrets, passwords, and tokens stolen from source code repositories (37%); and API data breaches in third-party software and code (35%).&lt;/p&gt; 
&lt;p&gt;The complexity of creating software in the modern era makes it difficult to secure the software supply chain, Data Theorem COO Doug Dooley&lt;a href="https://www.linkedin.com/in/dougdooley/"&gt;&lt;/a&gt; said in an interview.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; font-style: italic;"&gt;"This is a pervasive and deep problem. No company is building 100% of their software by themselves anymore. There's a long tail of software suppliers in the ecosystem right now, from cloud service providers to open-source software developers to software vendors."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/dougdooley/"&gt;Doug Dooley&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The ESG study found that one of the most critical needs of organizations trying to secure their software supply chain is to have a handle on what's in their software and how it's working. "Because of the massive number of suppliers and partners, continuous discovery of components across the software supply chain is a major challenge," ESG Practice Director for Cybersecurity, Melinda Marks, said in a statement.&lt;/p&gt; 
&lt;p&gt;Marks said a majority of organizations (88%) in the survey stressed the importance of having an accurate inventory of third-party APIs and cloud services, &lt;a href="https://www.reversinglabs.com/blog/sbom-facts-know-whats-in-software-fend-off-supply-chain-attacks"&gt;making software bills of materials (SBOMs) key&lt;/a&gt;. However, she said the study found that creating and maintaining SBOMs was proving to be a challenge.&lt;/p&gt; 
&lt;p&gt;Here are five key takeaways from the new ESG software supply chain security study.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Get the report:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/the-buyers-guide-to-software-supply-chain-security"&gt;The Buyer’s Guide to Software Supply Chain Security&lt;/a&gt;&amp;nbsp;| Join the Webinar discussion:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/webinar/know-when-your-software-is-malware-spectra-assure"&gt;Why you need to upgrade your AppSec tools for the new era&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;1. Organizations say their supply chain security is 'robust,' but challenges persist&lt;/h2&gt; 
&lt;p&gt;Despite nearly three-quarters (74%) of organizations saying they have “robust” software supply chain security capabilities, they report multiple challenges and concerns with using third-party software. Specifically, at least one-third of respondents identified being too dependent on open-source software (OSS), struggling to identify vulnerabilities in the OSS code, or being victims of hackers that target popular OSS code.&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;2. Optimizing the efficiency of security in development is paramount&lt;/h2&gt; 
&lt;p&gt;Organizations need to look for ways to optimize efficiency as they incorporate security into their development processes to secure their software supply chain. Currently, organizations use tools both periodically by set time periods and upon code changes.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;3. Few organizations are using tools to generate SBOMs&lt;/h2&gt; 
&lt;p&gt;Regulations increasingly call for SBOMs to ensure software supply chain security. However, organizations are struggling to build accurate inventories of their software code composition. According to the study, only 22% of organizations are using an SBOM-generation tool. Of those, only 48% currently generate an SBOM as a part of the application development process for all applications, while 49% do so on a case-by-case basis.&lt;/p&gt; 
&lt;h2 style="font-weight: normal; font-size: 24px;"&gt;4. SBOMs are vital but still too difficult to generate&lt;/h2&gt; 
&lt;p&gt;Those organizations generating SBOMs find them useful for managing software supply chain risk. Unfortunately, more than three-quarters of the organizations using tools to generate SBOMs find the process challenging (36%) or very challenging (43%).&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="padding-left: 40px;"&gt;&lt;span style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300;"&gt;"While it's understood SBOMs are important to software supply chain security, most organizations are challenged with creating and maintaining current SBOMs. Organizations need continuous runtime scanning, discovery and inspection of open-source components, third-party libraries, and APIs in source code to best secure their applications."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/melindamarks22/"&gt;Melinda Marks&lt;/a&gt;&lt;/span&gt;&lt;/em&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;5. Security can be scaled by enabling developers&lt;/h2&gt; 
&lt;p&gt;Security organizations realize the need to empower developers to efficiently fix code issues to mitigate application vulnerabilities. Most organizations are prioritizing this effort to “shift security left” to developers, with more than nine in 10 identifying it as a high (39%) or top (52%) priority. The good news is that a majority of developers are completely (40%) or mostly (24%) comfortable taking on security responsibilities, with only 11% not comfortable with the idea.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;When failure is not an option&lt;/h2&gt; 
&lt;p&gt;The emergence of cloud-native applications and a growing reliance on third-party APIs and cloud services have fundamentally altered the software supply chain security challenge, by introducing new attack surfaces that have "already been exploited and are poised to remain in the crosshairs of hackers and cybercriminal activity," Dooley said.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Invest in modern software supply chain security tools&lt;/h2&gt; 
&lt;p&gt;Nearly half or survey respondents said the scanning of open-source code components and third-party libraries for vulnerabilities (44%) was their top priority for investments in software supply chain security over the next 12 to 18 months. "That's a basic first step," Dooley said. Other items on the priority list include inspecting APIs in source code (39%), creating an SBOM (38%), and scanning production environments for vulnerabilities (37%).&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;"Where it becomes more complicated is when you're using a third-party API service and you don't have the underlying code. You're using it like a black box."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Doug Dooley&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Failure to rise to the challenge of supply chain security problems puts sensitive data and applications at risk and erodes the trust and integrity enterprise customers have built their business on, Dooley said.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Matt Rose, field CISO at ReversingLabs, said SBOMs are a great first step in an organization's software supply chain security journey. But they need to go beyond the SBOM's creation to a comprehensive software supply chain security program.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;SBOMs can help in a lot of ways because they give a&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/sbom-facts-know-whats-in-software-fend-off-supply-chain-attacks"&gt;list of all the ingredients in a software package&lt;/a&gt;&lt;span&gt;. But they don't give you information on how these ingredients interact. It is not realistic to think that a third-party vendor will send source code for you to inspect for supply chain risks. That's because no vendor is ever going to say, "My software is riddled with holes."&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="padding-left: 40px;"&gt;&lt;span&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;"Software supply chain security mechanisms need to be implemented in a way that is not cumbersome, complex, or disruptive to existing CI/CD and release processes. NIST's&amp;nbsp;&lt;a href="https://csrc.nist.gov/projects/ssdf"&gt;Secure Software Development Framework&lt;/a&gt;&amp;nbsp;is the best standard right now, but there are others as well."&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Given the complexity and disparity of software supply chains, Rose wrote recently, &lt;a href="https://www.reversinglabs.com/blog/why-software-supply-chain-security-is-now-a-requirement"&gt;the complexity of modern development calls for modern tools&lt;/a&gt; to manage risk across the software development lifecycle (SDLC).&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;i&gt;"While legacy AppSec testing (technologies such as SAST, DAST, RASP, and SCA) focuses on application source code, packages, and an application at runtime, what you receive from vendors is binaries — which is why binary analysis of the compiled packages is where you should be looking to identify risks."&lt;/i&gt;&lt;br&gt;&lt;i&gt;—Matt Rose&lt;/i&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;With complex binary analysis, organizations can evaluate all of the software they produce and consume, including third-party commercial software. The Enduring Security Framework, a public-private working group led by the National Security Agency (NSA) and CISA, recently stepped up its software supply chain security guidance with a &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;call for complex binary analysis and reproducible builds&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;&lt;/a&gt;Rose noted.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fcomplexity-and-software-supply-chain-security-study-5-key-takeaways&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 15 Feb 2024 17:25:11 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/complexity-and-software-supply-chain-security-study-5-key-takeaways</guid>
      <dc:date>2024-02-15T17:25:11Z</dc:date>
    </item>
    <item>
      <title>Meet the New RL Partner Program</title>
      <link>https://www.reversinglabs.com/blog/meet-the-new-rl-partner-program</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/meet-the-new-rl-partner-program" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Blog-RL-We-love-our-Partners.png" alt="Meet the New RL Partner Program" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;It’s Valentine’s Day. What better way to celebrate togetherness than to make a big gesture of love with the announcement of the new &lt;a href="http://partners.reversinglabs.com"&gt;RL Partner Program&lt;/a&gt;?&lt;br&gt;&lt;br&gt;The threat landscape is growing, and the only way to stay in front of malicious actors is through collaboration with the best and brightest security experts – &lt;a href="https://youtu.be/kbW5sxyu9bU?feature=shared&amp;amp;t=12"&gt;Captain Planet style&lt;/a&gt;. Businesses struggle to identify compliance issues, exposures, and threats like malware, tampering, vulnerabilities, mitigation guidance, exposed secrets, and license issues.&amp;nbsp;&lt;br&gt;&lt;br&gt;The RL Partner Program is a testament to an ecosystem approach that’s paramount in building comprehensive security resiliency, especially as cybersecurity leaders &lt;a href="https://www.isaca.org/about-us/newsroom/press-releases/2023/new-isaca-research-59-percent-of-cybersecurity-teams-are-understaffed"&gt;grapple with understaffing&lt;/a&gt; that impacts the capability to manage the most common threats (of which supply chain threats are in the top three concerns).&amp;nbsp;&amp;nbsp;&lt;br&gt;&lt;br&gt;The new partner program expands the impact of ReversingLabs’ solutions by ensuring seamless integration into existing security stacks while tailoring category expertise to ensure our solutions perfectly align with an organization’s security objectives – no matter the organization’s security posture or maturity.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-RL-We-love-our-Partners.png?width=1400&amp;amp;height=732&amp;amp;name=Blog-RL-We-love-our-Partners.png" width="1400" height="732" alt="Blog-RL-We-love-our-Partners" style="height: auto; max-width: 100%; width: 1400px;"&gt;It’s Valentine’s Day. What better way to celebrate togetherness than to make a big gesture of love with the announcement of the new &lt;a href="http://partners.reversinglabs.com"&gt;RL Partner Program&lt;/a&gt;?&lt;br&gt;&lt;br&gt;The threat landscape is growing, and the only way to stay in front of malicious actors is through collaboration with the best and brightest security experts – &lt;a href="https://youtu.be/kbW5sxyu9bU?feature=shared&amp;amp;t=12"&gt;Captain Planet style&lt;/a&gt;. Businesses struggle to identify compliance issues, exposures, and threats like malware, tampering, vulnerabilities, mitigation guidance, exposed secrets, and license issues.&amp;nbsp;&lt;br&gt;&lt;br&gt;The RL Partner Program is a testament to an ecosystem approach that’s paramount in building comprehensive security resiliency, especially as cybersecurity leaders &lt;a href="https://www.isaca.org/about-us/newsroom/press-releases/2023/new-isaca-research-59-percent-of-cybersecurity-teams-are-understaffed"&gt;grapple with understaffing&lt;/a&gt; that impacts the capability to manage the most common threats (of which supply chain threats are in the top three concerns).&amp;nbsp;&amp;nbsp;&lt;br&gt;&lt;br&gt;The new partner program expands the impact of ReversingLabs’ solutions by ensuring seamless integration into existing security stacks while tailoring category expertise to ensure our solutions perfectly align with an organization’s security objectives – no matter the organization’s security posture or maturity.&lt;/p&gt;  
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;It takes a hands-on relationship&lt;/h2&gt; 
&lt;p&gt;ReversingLabs COO Peter Doggart said these customer benefits are only possible through a genuine hands-on relationship that includes mutual intelligence-sharing and in-depth training on the threat landscape.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="padding-left: 40px;"&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;“We are championing our partners' growth strategies with offerings that address various use cases, from SBOM generation and SOC automation to threat hunting and analysis."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/doggart/"&gt;Peter Doggart&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;Announced in 2023, RL’s &lt;a href="https://www.reversinglabs.com/newsroom/press-releases/digicert-partners-with-reversinglabs-to-advance-software-supply-chain-security"&gt;relationship with DigiCert&lt;/a&gt; has opened new opportunities to strengthen trust throughout the software development pipeline.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;“DigiCert helps organizations put digital trust to work, and our partnership with ReversingLabs unlocks real value. Together our technology integration and go-to-market strategy have helped define and enforce policies for tamper-proof software delivery, building trust with customers and within software supply chains," said &lt;a href="https://www.linkedin.com/in/deepika-chauhan-b030aa1/"&gt;Deepika Chauhan&lt;/a&gt;,&lt;a href="https://www.linkedin.com/in/deepika-chauhan-b030aa1/"&gt; &lt;/a&gt;Chief Product Officer at DigiCert&lt;a href="https://www.linkedin.com/in/deepika-chauhan-b030aa1/"&gt;.&lt;/a&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;Another highlight of the RL Partner Program is ReversingLabs’ &lt;a href="https://www.reversinglabs.com/newsroom/press-releases/pwc-and-reversinglabs-form-strategic-alliance-to-bring-software-supply-chain-security-to-third-party-risk-management-programs"&gt;collaboration with PwC UK&lt;/a&gt;, establishing the next generation of third-party risk management (TPRM) for their European customers "[Our alliance provides] clients with the visibility they need to understand and reduce third-party risks to their software supply chain," said &lt;a href="https://www.linkedin.com/in/ian-trinder-78326414/"&gt;Ian Trinder&lt;/a&gt;, Director of PwC UK.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;a href="https://www.reversinglabs.com/alliances/synopsys"&gt;Working with Synopsys&lt;/a&gt;, RL is expanding and optimizing malware analysis to jointly tackle complex supply chain threats.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Spread the love with a trusted partner&lt;/h2&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;Companies, both large and small, rely on ReversingLabs’ constellation of consultants, security advisors, and value-added resellers. They are the trusted advisors to thousands of security teams worldwide.&lt;br&gt;&lt;br&gt;The RL Partner Program is a new initiative that reflects a long-standing ReversingLabs value: collaboration. For the past 15 years, ReversingLabs has delivered critical threat intelligence to F500 companies and over 60 of the world’s most recognizable and impactful cybersecurity companies.&lt;/p&gt; 
 &lt;p&gt;Introduced swiftly on the heels of the launch of &lt;a href="https://www.reversinglabs.com/solutions/protect-against-software-supply-chain-attacks"&gt;Spectra Assure for software supply chain security&lt;/a&gt;, our new Partner Program provides resellers, distributors, consultants, MSSPs, and technology providers the sales and marketing tools to ensure that RL solutions can reach even more organizations around the world.&lt;br&gt;&lt;br&gt;&lt;span style="font-size: 20px;"&gt;&lt;span style="font-weight: bold;"&gt;Spread the love and visit our &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/value-added-partners" style="font-weight: bold;"&gt;partner page&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; to learn more about the benefits of working with a ReversingLabs partner.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;If your organization wants to cuddle up with ReversingLabs to tackle complex security threats jointly, contact our Partnership team at &lt;/span&gt;&lt;a href="mailto:partners@reversinglabs.com" style="font-style: italic;"&gt;partners@reversinglabs.com&lt;/a&gt;&lt;span style="font-style: italic;"&gt;, or apply for the &lt;/span&gt;&lt;a href="http://partners.reversinglabs.com" style="font-style: italic;"&gt;RL Partner Program online&lt;/a&gt;&lt;span style="font-style: italic;"&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fmeet-the-new-rl-partner-program&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Company &amp; Events</category>
      <pubDate>Wed, 14 Feb 2024 17:38:00 GMT</pubDate>
      <author>contact@reversinglabs.com (ReversingLabs)</author>
      <guid>https://www.reversinglabs.com/blog/meet-the-new-rl-partner-program</guid>
      <dc:date>2024-02-14T17:38:00Z</dc:date>
    </item>
    <item>
      <title>5 software supply chain attacks you can learn from</title>
      <link>https://www.reversinglabs.com/blog/supply-chain-attacks-you-can-learn-from</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/supply-chain-attacks-you-can-learn-from" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/software-supply-chain-attacks-lessons-learned.jpg" alt="5 software supply chain attacks you can learn from" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;While the notable software supply chain incidents of 2023 did not reverberate like the watershed attack on &lt;a href="https://register.reversinglabs.com/lessons-learned-from-the-solarwinds-sunburst-attack"&gt;SolarWinds in 2020&lt;/a&gt;, they had plenty to teach security teams across software development, application security (AppSec), and risk management.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/software-supply-chain-attacks-lessons-learned.jpg?width=1400&amp;amp;height=732&amp;amp;name=software-supply-chain-attacks-lessons-learned.jpg" width="1400" height="732" alt="software-supply-chain-attacks-lessons-learned" style="height: auto; max-width: 100%; width: 1400px;"&gt;While the notable software supply chain incidents of 2023 did not reverberate like the watershed attack on &lt;a href="https://register.reversinglabs.com/lessons-learned-from-the-solarwinds-sunburst-attack"&gt;SolarWinds in 2020&lt;/a&gt;, they had plenty to teach security teams across software development, application security (AppSec), and risk management.&lt;/p&gt;  
&lt;p style="text-align: left;"&gt;Software supply chain &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;threats have spiked dramatically over the past three years (up 1,300%)&lt;/a&gt;, and attacks continued to rise in 2023. The a&lt;span&gt;nalyst firm Gartner found that almost two-thirds (61%) of all U.S. businesses were &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report"&gt;directly impacted by software supply chain attacks&lt;/a&gt; between April 2022 and April 2023.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are lessons learned from key&lt;/span&gt;&lt;span&gt;&amp;nbsp;software supply chain attacks&amp;nbsp;&lt;/span&gt;that&lt;strong&gt; &lt;/strong&gt;took place&amp;nbsp;in&lt;span&gt;&amp;nbsp;2023. Put&amp;nbsp;&lt;/span&gt;these lessons&amp;nbsp;&lt;span&gt;to work to get out in front of risk &lt;/span&gt;at&amp;nbsp;&lt;span&gt;your organization in 2024.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold; font-size: 20px;"&gt;[ Get the report:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/the-buyers-guide-to-software-supply-chain-security"&gt;The Buyer’s Guide to Software Supply Chain Security&lt;/a&gt;&amp;nbsp;| Join the Webinar discussion:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/webinar/know-when-your-software-is-malware-spectra-assure"&gt;Why you need to upgrade your AppSec tools for the new era&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2&gt;1. CircleCI raises red flags for secrets&lt;/h2&gt; 
&lt;p&gt;In January 2023, software development service &lt;a href="https://www.reversinglabs.com/blog/after-hack-circleci-tells-devs-to-update-secrets-now"&gt;CircleCI discovered that malware had been deployed on an engineer’s laptop &lt;/a&gt;and was used to open a single-sign-on (SSO) session backed by two-factor authentication, which allowed the attackers to access the company’s internal systems. After discovering the breach, CircleCI began rotating all GitHub OAuth tokens on behalf of its customers.&lt;/p&gt; 
&lt;p&gt;Guy Rosenthal, vice president for product at DoControl, said one of the biggest lessons learned from the CircleCI incident was that even properly implemented multifactor authentication (MFA) can be defeated if an endpoint such as a laptop isn't secure.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The takeaway here is that it’s not enough just to do MFA or just to secure endpoints, but that it must be assumed that each of these items can be defeated. Therefore, multiple security points and constant monitoring are critical."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/guyrosenthal/"&gt;Guy Rosenthal&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;James McQuiggan, a security awareness advocate with KnowBe4, said o&lt;/span&gt;rganizations should understand the weak points of MFA and the importance of implementing non-phishable MFA for sensitive or critical systems.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"MFA session keys can be circumvented and stolen by cybercriminals. Using hardware tokens can reduce the risk of an attack and support other cybersecurity monitoring systems."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/jmcquiggan/"&gt;James McQuiggan&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The CircleCi attack also exposed the risk the human element can bring to software supply chain security, said Lorri Janssen-Anessi, director for external cybersecurity assessments at BlueVoyant.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Cybercriminals will always try to come up with plausible solutions to get you to click on a link or download an attachment. Ensuring education, training, and then implementing a security program that has mechanisms in place to defend against this type of compromise is critical."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/lorri-janssen-anessi-b14572165/"&gt;Lorri Janssen-Anessi&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Matt Rose, field CISO for ReversingLabs, said that good digital hygiene is important but that the CircleCI incident illustrates more broadly that organizations have to not only be concerned about malware injection and secrets leaks generally, but also of the tooling used to build software packages.&lt;/p&gt; 
&lt;p&gt;When assessing supply chain risk, the focus is on the artifact as it moves through the process, but risks can be lurking in the tools that make up the process itself. If all the testing is done on the artifact — whether it's software composition analysis (SCA), static application security testing (SAST), penetration testing, or something else — something will be missed unless the core competencies, such as IDE and CI/CD, are examined, Rose said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;If an organization looks only at the artifact and not the structure that builds it, that organization potentially has a software supply chain risk.&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;2. 3CX: Don't be complacent about tampering&lt;/h2&gt; 
&lt;p&gt;Another lesson came in March, when 3CX notified its customers that the desktop application they were using may have been &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;compromised in a software supply chain attack&lt;/a&gt; that let intruders plant, in a software update, malware that steals information from the computers it infects. Damage was minimized by 3CX's security provider, Crowdstrike.&lt;/p&gt; 
&lt;p&gt;The 3CX case is good example of why organizations need to use multiple tools and adopt a defense-in-depth approach to security, DoControl's Rosenthal said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"By watching what applications are doing on endpoints and on the network and knowing what 'normal' looks like, we can detect and alert on anomalous behaviors."&lt;br&gt;—Guy Rosenthal&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span&gt;A ReversingLabs analysis concluded that&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update"&gt;3CX was actually the victim of a targeted supply chain attack&lt;/a&gt;&lt;span&gt;, not an opportunistic attack that exploited a vulnerability in a shared software library. It found discrepancies in 3CX's versions of two standard libraries used with the Electron open-source framework on which the 3CXDesktopApp client is built: &lt;span style="font-style: italic;"&gt;ffmpeg&lt;/span&gt; and &lt;span style="font-style: italic;"&gt;d3dcompiler_47&lt;/span&gt;.&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;The message for software vendors here: Companies cannot be complacent. In this case there was ample evidence of tampering with the desktop client updates that 3CX sent out. Even in the absence of warnings by endpoint detection and response, that evidence should have been enough to put a pause on distributing the update, &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;wrote Paul Roberts&lt;/a&gt;, cyber-content lead at ReversingLabs.&lt;/p&gt; 
&lt;p&gt;With sophisticated actors increasingly interested in abusing the hard-earned reputation of software teams to distribute malware, vendors need to be on guard for signs that malicious actors are at work within vendors' development and build processes, Roberts wrote. That awareness may not stop compromises, but it will make it less likely that a software vendor's customers end up suffering the consequences of the company's security failings.&amp;nbsp;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Karlo Zanki, reverse engineer at ReversingLabs, wrote &lt;span&gt;that &lt;a href="https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update"&gt;one key lesson is the need for modernizing security tooling&lt;/a&gt;. One requirement for detecting supply chain compromises is the ability to track the &lt;/span&gt;&lt;em&gt;e&lt;/em&gt;volution&lt;span&gt;&amp;nbsp;of software packages&lt;/span&gt;&lt;em&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/em&gt;&lt;span&gt;through differential analysis of their contents, he wrote. This includes the raw metadata properties of each software component in the release, as well as their respective behaviors.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Odd or inexplicable changes between builds should be considered a cause to investigate a possible compromise. This becomes even more important when software packages include components that are pre-compiled at offsite locations and, therefore, not subject to review prior to deployment."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/karlo-zanki-b8a2341a5/"&gt;Karlo Zanki&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-weight: bold; font-size: 20px;"&gt;[ See related post:&lt;span style="font-style: italic;"&gt; &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks" style="font-style: normal;"&gt;A (partial) history of software supply chain attacks&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;3. NuGet is a nugget of takeaways&lt;/h2&gt; 
&lt;p&gt;Some valuable lessons were learned from another attack in March. This time adversaries used sophisticated &lt;a href="https://www.reversinglabs.com/blog/the-week-in-security-nuget-hit-with-typosquatting-campaign-fake-chatgpt-ext-hijacks-facebook-accounts"&gt;typosquatting techniques to target .NET developers using the NuGet repository.&lt;/a&gt; The poisoned packages were downloaded 150,000 times before the malware could be removed from the repository. The packages contained a "download and execute" payload, so as soon as they were downloaded, they automatically downloaded a second, more virulent payload.&lt;/p&gt; 
&lt;p&gt;Sarah Jones, a cyberthreat intelligence research analyst with Critical Start, said the NuGet attack illustrates why we need enhanced code signing, regular vulnerability audits, and efficient incident response. "Collaboration within the .NET community played a crucial role, stressing the significance of collective action, vigilance in dependency management, and prioritizing packages with community support," she said.&lt;/p&gt; 
&lt;p&gt;DoControl's Rosenthal said trust was compromised.&lt;em&gt; &lt;/em&gt;"In DevSecOps, the devil is in the details," he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"It’s easy for developers to glance at the names and other metadata of the packages to select the desired code libraries, but, as this attack showed, that information can be misleading and even intentionally falsified to create trust. In the end, developers need to be careful in curating what code they use, taking time to verify the details before downloading and using. It also reminds us that automatic execution is not a great idea."&lt;br&gt;&lt;span style="font-size: 24px;"&gt;—Guy Rosenthal&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;4. MOVEit: A wakeup call&lt;/h2&gt; 
&lt;p&gt;More key lessons were learned in the &lt;a href="https://www.reversinglabs.com/blog/moveit-supply-chain-bug-exploited-for-two-years"&gt;MOVEit attack in May&lt;/a&gt;. The assault on the transfer and cloud applications of the offering by Progress Software leveraged two critical SQL injection vulnerabilities, CVE-2023-34362 and CVE-2023-35036, that allowed the attackers to gain unauthorized access to customers' systems and steal sensitive data, execute malicious code, and manipulate or delete critical information. The attack affected more than 963 organizations worldwide, including prominent companies such as Shell, British Airways, Deloitte, and the BBC, and even government agencies in the United States and the United Kingdom.&lt;/p&gt; 
&lt;p&gt;Critical Start's Jones said MOVEit illustrated the need for prioritizing regular software updates, transparent communication between vendor and user, and thorough mapping of the software supply chain.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The MOVEit attack served as a wakeup call for organizations relying on legacy software. The incident highlighted the interconnected nature of the supply chain and the importance of identifying vulnerabilities in all components."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/sarah-jones-209b9690/"&gt;Sarah Jones&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;BlueVoyant's Janssen-Anessi said security teams aren't alone in learning from these kinds of attacks.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"In our annual supply chain survey of C-level executives, we found breaches like MOVEit led to 60% of respondents saying their budget would increase to protect against these type of breaches."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Lorri Janssen-Anessi&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;More than anything else, the MOVEit attack shows that the full impact of this kind of breach will not be known for months or even years after it initially comes to light, said DoControl's Rosenthal.&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;5. HuggingFace: AI dataset poisoning gets smart&lt;/h2&gt; 
&lt;p&gt;While many organizations &lt;a href="https://www.reversinglabs.com/blog/generative-ai-like-chatgtp-unleashes-the-next-generation-of-software-supply-chain-attacks"&gt;grappled with artificial intelligence (AI)&lt;/a&gt; and its large language models (LLM) during the year, those technologies presented adversaries with more supply chains to attack, as &lt;a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach"&gt;the HuggingFace API compromise illustrates&lt;/a&gt;. HuggingFace is a popular resource for developers of LLM projects. It contains hundreds of thousands of AI models and datasets in its repository. At the end of 2023, cybersecurity researchers at Lasso discovered more than 1,600 leaked tokens that opened up access to the accounts of 723 organizations, including Google, Meta, Microsoft, and VMware.&lt;/p&gt; 
&lt;p&gt;Steve Wilson, chief product officer at Exabeam and project manager for &lt;a href="https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai"&gt;the OWASP Top 10 for LLM&lt;/a&gt;, said poisoned ML models exposed a bigger software supply chain security concern.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Hugging Face highlights the risks of tainted ML models as a supply chain vulnerability. This was a wakeup call regarding the potential for malicious actors to manipulate machine-learning models, turning them into vehicles for cyberattacks."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/wilsonsd/"&gt;Steve Wilson&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Wilson said the detection of zero-day vulnerabilities in essential MLOps tools such as PyTorch "underscored the fragility of the AI supply chain."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Such vulnerabilities in widely used tools can have far-reaching impacts, affecting numerous applications and systems built on these platforms."&lt;br&gt;—Steve Wilson&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;Put these lessons to work in 2024&lt;/h2&gt; 
&lt;p&gt;Wilson called the AI supply chain "a war zone," where threats are constantly evolving, because traditional &lt;a href="https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security"&gt;AppSec testing tools such as SCA&lt;/a&gt; and the &lt;a href="https://www.reversinglabs.com/blog/owasp-program-founder-calls-for-supply-chain-security-that-goes-beyond-vulnerability-detection"&gt;focus on vulnerabilities using the CVE database,&lt;/a&gt; while valuable, "are still adapting to the unique challenges posed by AI supply chain security."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The taxonomy around AI vulnerabilities is still developing, indicating that we are in the early stages of effectively understanding and combating these threats."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Steve Wilson&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Jeff Williams, CTO and co-founder at Contrast Security, said there were general lessons security teams can learn from 2023's class of software supply chain attacks.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Hopefully, we learned that software supply chains are complex — an entire ecosystem of tools and technologies that have traditionally been ignored by both security and hackers. But that has all changed as hackers have realized the power of attacking supply chains."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/planetlevel/"&gt;Jeff Williams&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Williams noted that there are four major categories of supply chain targets: software you write, software you import, software you buy, and software you use to build software.&lt;span&gt;&amp;nbsp; &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Organizations should start with the basics. Think through the threat model, limit the breadth of the ecosystem, establish controls to minimize vulnerability, and establish infrastructure for fast detection and response."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Jeff Williams&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;With software supply chain risk front and center for CISOs, the lessons learned from 2023's crop of software supply chain attacks need to be learned fast, as even more adversary activity is expected in 2024.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fsupply-chain-attacks-you-can-learn-from&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Artificial Intelligence (AI)/Machine Learning (ML)</category>
      <pubDate>Wed, 14 Feb 2024 13:00:00 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/supply-chain-attacks-you-can-learn-from</guid>
      <dc:date>2024-02-14T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Software supply chain security: Upgrade your AppSec for a new era</title>
      <link>https://www.reversinglabs.com/blog/why-software-supply-chain-security-is-now-a-requirement</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/why-software-supply-chain-security-is-now-a-requirement" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/trust-software-supply-chain-security.jpg" alt="Software supply chain security: Upgrade your AppSec for a new era" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;The software supply chain security landscape has shifted considerably over the last year. Two of the most significant changes have been the move to a more formalized definition of the term "software supply chain security” and the development of a better understanding of what is needed to secure the software development lifecycle (SDLC).&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/trust-software-supply-chain-security.jpg?width=1400&amp;amp;height=732&amp;amp;name=trust-software-supply-chain-security.jpg" width="1400" height="732" alt="trust-software-supply-chain-security" style="height: auto; max-width: 100%; width: 1400px;"&gt;The software supply chain security landscape has shifted considerably over the last year. Two of the most significant changes have been the move to a more formalized definition of the term "software supply chain security” and the development of a better understanding of what is needed to secure the software development lifecycle (SDLC).&lt;/p&gt;  
&lt;p&gt;A year ago, securing the software supply chain was all about open-source packages, &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risk-and-sbom-automation-the-next-step-in-modern-security-practices"&gt;software bills of materials (SBOMs)&lt;/a&gt;and using &lt;a href="https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security"&gt;software composition analysis (SCA)&lt;/a&gt;. Now, there is a realization that the risk from the increasingly complex software supply chain is multifaceted.&lt;/p&gt; 
&lt;p&gt;Software producers and enterprise consumers have come to recognize that, while securing source code and open-source packages is important, it alone is not enough to control risk from software supply chain attacks. Teams also need to have mechanisms to detect potential compromises of the development tool chain, from the &lt;a href="https://www.reversinglabs.com/blog/8-cicd-security-best-practices-software-pipeline"&gt;continuous integration/continuous deployment (CI/CD) orchestration platform&lt;/a&gt; to the build environment to code repositories and binary repositories.&lt;/p&gt; 
&lt;p&gt;In addition to updated guidance from federal agencies and the White House, analyst firm Gartner has produced &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report"&gt;guidance on managing software supply chain risk&lt;/a&gt; that marks a shift in thinking. It goes into detail about software supply chain security best practices. (Hint: There's more to it than just saying, "You need an SBOM.") Then there's ReversingLabs' new research-based report, &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;the State of Software Supply Chain Security 2024&lt;/a&gt;, which highlights the need for a new approach.&lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;An &lt;a href="https://www.reversinglabs.com/blog/the-evolution-of-appsec-5-key-changes-required-for-a-new-era"&gt;evolution of application security (AppSec)&lt;/a&gt; is under way, and a key to it is &lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;complex binary analysis&lt;/a&gt;, which is like a final exam for your software package before release. Complex binary analysis allows your team to review the software in final form so that you can trust all of the software your organization produces and consumes.&amp;nbsp;&lt;br&gt;&lt;br&gt;Here's why you need to consider complex binary analysis a requirement in the new era of software supply chain security.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Get the report: &lt;a href="https://www.reversinglabs.com/the-buyers-guide-to-software-supply-chain-security"&gt;The Buyer’s Guide to Software Supply Chain Security&lt;/a&gt; | Join the Webinar discussion: &lt;a href="https://www.reversinglabs.com/webinar/know-when-your-software-is-malware-spectra-assure"&gt;Why you need to upgrade your AppSec tools for the new era&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;Software complexity: Different lenses of attack&lt;/h2&gt; 
&lt;p&gt;A couple of factors are driving this change. The first is the new and still largely unknown nature of the threats to software supply chains. To keep up with the demand for faster releases, organizations have moved from very staid and plodding development processes, where everybody knew what was happening, to fast development using shared code resources from platforms such as GitHub — which now is increasingly under attack. One result is that security teams are now siloed into specific responsibility areas.&lt;/p&gt; 
&lt;p&gt;Given the complexity and disparity of software supply chains, it is no longer possible to get a full picture of software risk until everything is brought together in the final package. And many software supply chain attacks are novel. Future attacks may match the severity of SolarWinds Sunburst, but they will almost certainly differ in their methodology.&lt;/p&gt; 
&lt;p&gt;In fact, several major supply chain breaches that have occurred &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;since the attack on SolarWinds &lt;/a&gt;have used different execution. The &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;breach at 3CX,&lt;/a&gt; for instance, resulted from a legitimately signed third-party software component. The &lt;a href="https://www.reversinglabs.com/blog/circleci-hack-is-a-red-flag-for-security-teams-on-the-software-supply-chain"&gt;CircleCI&lt;/a&gt; breach stemmed from a compromise of its CI/CD orchestration platform itself, and the breach at &lt;a href="https://www.reversinglabs.com/blog/it-only-takes-one-line-of-code-to-ruin-your-day"&gt;Codecov&lt;/a&gt; resulted from credentials theft and misuse.&lt;/p&gt; 
&lt;p&gt;All of these were serious software supply chain attacks, and they all took different paths. It's clear that attackers are testing the waters. They are trying to get out of the fenced yard by pushing on the fence panels to see which one will give. What these attackers are doing is looking at all aspects of the SDLC for potential weaknesses, which they can then attack.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px; padding-left: 40px;"&gt;&lt;em&gt;Increasingly, teams responsible for managing risk are realizing that they need to stop thinking of SunBurst as a unique category of supply chain attack and focus instead on the bigger picture.&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Technologies for identifying threats to the supply chain are vital at every step of the development process because you don't know whether a threat actor is going to try to attack the build system or code repositories or seek some other way to slip malware into the software pipeline. Increasingly, teams responsible for managing risk are realizing that they need to stop thinking of SunBurst as a unique category of supply chain attack and focus instead on the bigger picture.&lt;/p&gt; 
&lt;h2&gt;The mandate for modernizing AppSec gets real&lt;/h2&gt; 
&lt;p&gt;Another driver for change is that software supply chain attacks have garnered much attention as a primary risk category, and organizations are starting to freak out a little bit. Security teams are buckling down, trying to find a process for securing the SDLC. A lot of the initial momentum came from the federal government, starting with the &lt;a href="https://www.reversinglabs.com/blog/assessment-cybersecurity-executive-order-one-year-on"&gt;May 2021 executive order from the White House&lt;/a&gt;, which called for increasing the United States' cybersecurity resiliency. That was followed by a memo &lt;a href="https://www.reversinglabs.com/blog/self-attestation-what-software-teams-need-to-know"&gt;calling for self-attestation&lt;/a&gt; by software producers and the creation of SBOMs. Gartner also &lt;a href="https://www.reversinglabs.com/blog/gartner-explains-why-sboms-are-critical-to-software-supply-chain-security-management"&gt;joined the call for SBOMs&lt;/a&gt; in 2022.&lt;br&gt;&lt;br&gt;One initiative that received a lot of attention in 2023 was Secure by Design, championed by t&lt;span&gt;he U.S. Cybersecurity and Infrastructure Security Agency (CISA), because a key aim of the initiative is to &lt;a href="https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon"&gt;shift liability from software consumers to the producers of the software&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;span&gt;More recently, the Enduring Security Framework, a public-private working group led by the National Security Agency (NSA) and CISA, stepped up its software supply chain security guidance with a &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;call for complex binary analysis and reproducible builds.&lt;/a&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Definitive timeline: &lt;a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security"&gt;Federal guidance on software supply chain security&lt;/a&gt; ]&lt;/p&gt; 
&lt;p&gt;In the next 12 to 18 months, it is reasonable to expect that higher &lt;a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security"&gt;standards for software supply chain security are going to apply to a wider swath of organizations&lt;/a&gt; and not just those doing business with the federal government. Ahead of that, organizations need a way to anticipate and answer questions about the security of their software supply chain. Those that can &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-security-compliance-get-out-front"&gt;get out in front of that risk will have a competitive advantage&lt;/a&gt; — and stay out of the headlines.&lt;/p&gt; 
&lt;h2&gt;Modern development requires modern tools&lt;/h2&gt; 
&lt;p&gt;Software supply chain security mechanisms need to be implemented in a way that is not cumbersome, complex, or disruptive to existing CI/CD and release processes. NIST's &lt;a href="https://csrc.nist.gov/projects/ssdf"&gt;Secure Software Development Framework&lt;/a&gt; is the best standard right now, but there are others as well. Organizations have to identify which standard works best for the way they develop or consume software because people code in different ways and with different kinds of technology stacks.&lt;/p&gt; 
&lt;p&gt;Organizations need to identify the standard that best works for them as they try to manage software supply chain risk, and they need to stick with it. &lt;span&gt;With complex binary analysis, organizations can evaluate all of the software they produce and consume, including third-party commercial software.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="padding-left: 40px;"&gt;&lt;span&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;While legacy AppSec testing focuses on source code, what you receive from vendors is binaries&amp;nbsp;— which is why binary analysis of the compiled packages is where you should be looking to identify risks.&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;SBOMs can help in a lot of ways because they give a &lt;a href="https://www.reversinglabs.com/blog/sbom-facts-know-whats-in-software-fend-off-supply-chain-attacks"&gt;list of all the ingredients in a software package&lt;/a&gt;. But they don't give you information on how these ingredients interact. It is not realistic to think that a third-party vendor will send source code for you to inspect for supply chain risks. That's because no vendor is ever going to say, "My software is riddled with holes."&lt;/p&gt; 
&lt;p&gt;While legacy AppSec testing (technologies such as SAST, DAST, RASP, and SCA) focuses on application source code, packages, and an application at runtime, what you receive from vendors is binaries — which is why binary analysis of the compiled packages is where you should be looking to identify risks.&lt;/p&gt; 
&lt;h2&gt;The evolution of AppSec must continue&lt;/h2&gt; 
&lt;p&gt;Everybody is &lt;a href="https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign"&gt;familiar with legacy AppSec testing&lt;/a&gt; — and it's not going away. But this new era is calling for your organization to get comfortable with an additional security technology that provides a completely different, but very important, lens of risk. If you are not doing real software supply chain security as part of your validation processes — that is, doing a final exam with complex binary analysis — then your software and your organization are not secure.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fwhy-software-supply-chain-security-is-now-a-requirement&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 13 Feb 2024 14:00:00 GMT</pubDate>
      <author>matthew.rose@reversinglabs.com (Matt Rose)</author>
      <guid>https://www.reversinglabs.com/blog/why-software-supply-chain-security-is-now-a-requirement</guid>
      <dc:date>2024-02-13T14:00:00Z</dc:date>
    </item>
    <item>
      <title>OWASP Top 10 for LLM 2.0: 3 key AppSec focus areas emerge</title>
      <link>https://www.reversinglabs.com/blog/owasp-top-10-llm-2.0</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/owasp-top-10-llm-2.0" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/owasp-top-10-llm-focus.jpg" alt="OWASP Top 10 for LLM 2.0: 3 key AppSec focus areas emerge" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;The project team for the &lt;a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/"&gt;OWASP Top 10 list of vulnerabilities for large language models (LLMs)&lt;/a&gt; has kicked off preparations for releasing version 2.0 of the list. &lt;a href="https://www.linkedin.com/pulse/announcing-owasp-top-10-large-language-model-v20-project-steve-wilson-an6jc/"&gt;In a newsletter published on LinkedIn&lt;/a&gt;, project lead Steve Wilson called &lt;a href="https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai"&gt;version 1.1 a considerable effort with a substantial impact&lt;/a&gt;, adding that version 2.0 will represent the first major revision.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/owasp-top-10-llm-focus.jpg?width=1400&amp;amp;height=732&amp;amp;name=owasp-top-10-llm-focus.jpg" width="1400" height="732" alt="owasp-top-10-llm-focus" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;The project team for the &lt;a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/"&gt;OWASP Top 10 list of vulnerabilities for large language models (LLMs)&lt;/a&gt; has kicked off preparations for releasing version 2.0 of the list. &lt;a href="https://www.linkedin.com/pulse/announcing-owasp-top-10-large-language-model-v20-project-steve-wilson-an6jc/"&gt;In a newsletter published on LinkedIn&lt;/a&gt;, project lead Steve Wilson called &lt;a href="https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai"&gt;version 1.1 a considerable effort with a substantial impact&lt;/a&gt;, adding that version 2.0 will represent the first major revision.&lt;/p&gt;  
&lt;p&gt;Wilson said that a key driver of the next version of the Top 10 for LLMs was a survey that the OWASP project team recently completed. He said in an interview that the team was gathering expert opinion from the front lines of application security (AppSec) about "emerging risks that they're seeing that may not be showing up in our data."&lt;/p&gt; 
&lt;p&gt;"Since we released versions 1.0 and 1.1, we've been working in the background to do some data gathering about the threat landscape," Wilson said. "Now we've put out a survey asking people for their opinions on the current list and to rank possible areas to explore for the 2.0 list."&lt;/p&gt; 
&lt;p&gt;For the OWASP Top 10 for LLMs 2.0, Wilson said, "everything is on the table."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"We’ll reevaluate the top vulnerabilities, how we classify them, and decide on relative rankings. Version 2.0 will have a significant new focus on data gathering and using that data to improve our recommendations."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/wilsonsd/"&gt;Steve Wilson&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Here are three key focal points for the next version of the OWASP Top 10 for LLMs.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See related posts: &lt;a href="https://www.reversinglabs.com/blog/ai-and-transparency-how-ml-model-creators-can-protect-against-supply-chain-attacks"&gt;How software supply chain security tools can protect ML models&lt;/a&gt; | &lt;a href="https://www.reversinglabs.com/blog/secure-ai-development-guidance-what-appsec-teams-needs-to-know"&gt;Secure AI development guidance: What software teams need to know&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;1. Data privacy&amp;nbsp;&lt;/h2&gt; 
&lt;p&gt;Wilson noted that the team received more than 100 responses to its survey, with about 75% of them from new participants or followers (40%) who were becoming active participants (35%).&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The 1.0 project was very grass-roots. What's interesting with 2.0 is that six or seven months later a lot of people submitted comments saying their companies were interested in the project. A lot of them are new-generation startups around AI security."&lt;br&gt;—Steve Wilson&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Wilson said that some of the themes from the survey will help drive some of the thinking of what to do on the list and provide grist for future projects.&lt;/p&gt; 
&lt;p&gt;One standout concern for survey respondent was data privacy. "Privacy has always been adjacent to security, but from the folks we interviewed and who responded to the survey, data privacy is at the top of line for AI applications," Wilson said.&lt;/p&gt; 
&lt;h2&gt;2. Safety and bias in LLM systems&lt;/h2&gt; 
&lt;p&gt;Another concern gleaned from the survey is safety and bias in LLM systems. "I was surprised that security people wanted more advice about things like safety and bias," Wilson said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"They're not things that have fallen into an application security team's purview before, but they're getting asked to help with them. I think we'll be looking to offer some more guidance around those."&lt;br&gt;—Steve Wilson&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;3. Mapping out vulnerabilities&lt;/h2&gt; 
&lt;p&gt;Wilson said the project team is dedicated to making the LLM list comparable to other OWASP lists, which are very data-driven and "based on CVEs and sources like that."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"What we've been working on is figuring out: How do we map some of these AI- and LLM-specific risks to some of the data sources out there. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;It turns out that some of the CVE descriptions and that kind of data are not conducive to recording the risks that we're seeing with large language models."&lt;br&gt;—Steve Wilson&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Wilson said the project team needed to do some bridging of the processes. "We're working with teams at MITRE and other organizations to standardize some of this so we can get a grip on what's going on in the real world," he said.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;A SQL injection, for example, is not the same in AI as it is with traditional AppSec risk.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The security risks with LLM are much harder to pin down and put into the boxes that are in the same shape as some of the more traditional security risks. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;There's a binary answer to SQL injection: 'Am I vulnerable to a SQL injection attack if I allow untrusted strings into my database?'"&lt;br&gt;—Steve Wilson&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;With LLMs, each model is taking in prompts as untrusted data, he said. "Then the questions become: To what degree am&lt;span&gt;&amp;nbsp;&lt;/span&gt;I vulnerable, and what kinds of vulnerabilities are there?"&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;OWASP Top 10 for LLM 2.0: Coming later this year&lt;/h2&gt; 
&lt;p&gt;The project team released a light update in August of its original document. Version 1.1, included a visual illustration of the data flow in a typical LLM application and the potential areas of risk from the vulnerabilities in the Top 10. For example, the data flow between an API and an LLM's production services could be vulnerable to a prompt injection or denial-of-service attack, or an application's plugins might contain insecure design excessive agency vulnerabilities.&lt;/p&gt; 
&lt;p&gt;Otherwise, the top vulnerabilities list remained the same:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;LLM01: Prompt Injection&lt;/strong&gt;, which is used to manipulate an LLM&lt;span&gt; &lt;/span&gt;through crafty inputs, causing unintended actions&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt; LLM02: Insecure Output Handling&lt;/strong&gt;, which occurs when an LLM output is accepted without scrutiny, exposing backend systems&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM03: Training Data Poisoning&lt;/strong&gt;, which occurs when LLM training data is tampered with, introducing vulnerabilities or biases that compromise security, effectiveness, or ethical behavior&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM04: Model Denial of Service&lt;/strong&gt;, which happens when attackers cause resource-heavy operations on LLMs, leading to service degradation or high costs&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM05: Supply Chain Vulnerabilities&lt;/strong&gt;, which take place when an application’s lifecycle is compromised by vulnerable components or services&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM06: Sensitive Information Disclosure&lt;/strong&gt;, which can arise when an LLM inadvertently reveals confidential data in its responses&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM07: Insecure Plugin Design&lt;/strong&gt;, which results in plugins with insecure inputs and insufficient access control, leading to consequences like remote code execution&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM08: Excessive Agency&lt;/strong&gt;, which surfaces when excessive functionality, permissions, or autonomy is granted to the LLM-based systems&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM09: Overreliance&lt;/strong&gt;, which crops up when systems or people become overly dependent on LLMs without oversight&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM10: Model Theft&lt;/strong&gt;, which involves unauthorized access, copying, or exfiltration of proprietary LLM models&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The project team is aiming to release the OWASP Top 10 for LLM 2.0 later this year.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"We want to get something out in the next six months. We expect to see drafts in the spring and maybe a new version of the list in the summer."&lt;br&gt;—Steve Wilson&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fowasp-top-10-llm-2.0&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Artificial Intelligence (AI)/Machine Learning (ML)</category>
      <pubDate>Thu, 08 Feb 2024 17:04:22 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/owasp-top-10-llm-2.0</guid>
      <dc:date>2024-02-08T17:04:22Z</dc:date>
    </item>
    <item>
      <title>Definitive timeline: Federal guidance on software supply chain security</title>
      <link>https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Federal-Blog-timeline-2024.webp" alt="Definitive timeline: Federal guidance on software supply chain security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;With major software supply chain attacks including &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;the SunBurst attack on SolarWinds in 2020&lt;/a&gt; and the critical vulnerability &lt;a href="https://www.reversinglabs.com/blog/log4j-one-year-in-attacks-software-supply-chain-security"&gt;Log4j&lt;/a&gt;, software security moved front and center for risk managers and software teams alike. These incidents, along with a &lt;a href="https://blog.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks"&gt;string of other attacks that span the past few decades&lt;/a&gt;, show the problem is only getting worse as bad actors target an increasingly complex process for building software — and the software development toolchain itself.&lt;br&gt;&lt;br&gt;The problem has accelerated dramatically in the past three years, with software supply chain threats via open-source repositories &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;skyrocketing by 1300% between 2020 and 2023&lt;/a&gt;, catching security teams off guard. Also: Nearly &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;nine out of 10 security and IT professionals surveyed in a 2023 study&lt;/a&gt; said that their companies detected security issues in their software supply chains in the last 12 months.&amp;nbsp;&lt;br&gt;&lt;br&gt;The problem of software supply chain security has also caught the attention of the U.S. federal government, which has been very active over the past few years in seeking to tackle the problem head on. Those efforts include the White House's &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;Executive Order on Improving the Nation’s Cybersecurity&lt;/a&gt;, released in May 2021, and a flurry of other critical initiatives and guidance that have followed, including &lt;a href="https://www.reversinglabs.com/blog/a-definitive-guide-to-software-supply-chain-guidance"&gt;the Secure by Design initiative in 2023.&lt;/a&gt;&lt;br&gt;&lt;br&gt;Here is a definitive timeline of the U.S.'s major software supply chain policy initiatives and mandates:&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Federal-Blog-timeline-2024.webp?width=1400&amp;amp;height=732&amp;amp;name=Federal-Blog-timeline-2024.webp" width="1400" height="732" alt="Timeline of Federal Guidance on Software Supply Chain Security" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;With major software supply chain attacks including &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;the SunBurst attack on SolarWinds in 2020&lt;/a&gt; and the critical vulnerability &lt;a href="https://www.reversinglabs.com/blog/log4j-one-year-in-attacks-software-supply-chain-security"&gt;Log4j&lt;/a&gt;, software security moved front and center for risk managers and software teams alike. These incidents, along with a &lt;a href="https://blog.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks"&gt;string of other attacks that span the past few decades&lt;/a&gt;, show the problem is only getting worse as bad actors target an increasingly complex process for building software — and the software development toolchain itself.&lt;br&gt;&lt;br&gt;The problem has accelerated dramatically in the past three years, with software supply chain threats via open-source repositories &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;skyrocketing by 1300% between 2020 and 2023&lt;/a&gt;, catching security teams off guard. Also: Nearly &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;nine out of 10 security and IT professionals surveyed in a 2023 study&lt;/a&gt; said that their companies detected security issues in their software supply chains in the last 12 months.&amp;nbsp;&lt;br&gt;&lt;br&gt;The problem of software supply chain security has also caught the attention of the U.S. federal government, which has been very active over the past few years in seeking to tackle the problem head on. Those efforts include the White House's &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;Executive Order on Improving the Nation’s Cybersecurity&lt;/a&gt;, released in May 2021, and a flurry of other critical initiatives and guidance that have followed, including &lt;a href="https://www.reversinglabs.com/blog/a-definitive-guide-to-software-supply-chain-guidance"&gt;the Secure by Design initiative in 2023.&lt;/a&gt;&lt;br&gt;&lt;br&gt;Here is a definitive timeline of the U.S.'s major software supply chain policy initiatives and mandates:&lt;/p&gt;  
&lt;p&gt;&lt;span style="font-weight: bold;"&gt; [ Key takeaways: &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;State of Software Supply Chain Security 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;&lt;/a&gt; | Get the &lt;a href="https://reversinglabs.com/sscs-report"&gt;full report&lt;/a&gt; ]&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Ftimeline-of-federal-guidance-on-software-supply-chain-security&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Wed, 07 Feb 2024 13:00:00 GMT</pubDate>
      <author>carolynn.vanarsdale@reversinglabs.com (Carolynn van Arsdale)</author>
      <guid>https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security</guid>
      <dc:date>2024-02-07T13:00:00Z</dc:date>
    </item>
    <item>
      <title>The Cloudflare source code breach: Lessons learned</title>
      <link>https://www.reversinglabs.com/blog/cloudflare-source-code-breach-lessons-learned</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/cloudflare-source-code-breach-lessons-learned" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/cloudflare-third-party-risk-secrets.jpg" alt="The Cloudflare source code breach: Lessons learned" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;High-profile web hosting company Cloudflare said last week that a sophisticated attacker gained access to code repositories used by the company and made off with sensitive internal code. This was just the latest such attack targeting the firm.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/cloudflare-third-party-risk-secrets.jpg?width=1400&amp;amp;height=732&amp;amp;name=cloudflare-third-party-risk-secrets.jpg" width="1400" height="732" alt="cloudflare-third-party-risk-secrets" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;High-profile web hosting company Cloudflare said last week that a sophisticated attacker gained access to code repositories used by the company and made off with sensitive internal code. This was just the latest such attack targeting the firm.&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;In a post on February 1 co-written by Cloudflare CEO Matthew Prince, CTO John Graham-Cumming, and CISO Grant Bourzikas, the company revealed the details of a November 2023 malicious campaign that lasted roughly 10 days and saw malicious actors make off with 76 different source-code repositories from Cloudflare’s Atlassian Bitbucket source-code repository.&lt;/p&gt; 
&lt;p&gt;Cloudflare tied the incident to a &lt;a href="https://sec.okta.com/articles/2023/10/tracking-unauthorized-access-oktas-support-system"&gt;&lt;span&gt;breach at online identity provider Okta&lt;/span&gt;&lt;/a&gt;, which happened in October 2023. In that incident, malicious actors compromised the company’s internal network and downloaded a report that included names and email addresses of all clients that use its customer support system. The company said the malicious actors behind the campaign also accessed “additional reports and support cases” that contained contact information for Okta-certified users, some Okta employee information, and Okta Customer Identity Cloud (CIC) customer contacts.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The Okta breach led to an earlier attack on Cloudflare, &lt;a href="https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise"&gt;&lt;span&gt;disclosed in October&lt;/span&gt;&lt;/a&gt;, in which attackers used an authentication token retrieved from Okta to “pivot into” Cloudflare’s Okta instance. The company said it detected and blocked that attack at the time with no discernible impact on its security posture.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Here's what we know about the latest Cloadflare breach – and lessons your team can learn from the incident.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Key takeaways: &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;State of Software Supply Chain Security 2024&lt;/a&gt; | Get the &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;full report&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;Okta: The breach that keeps on giving&lt;/h2&gt; 
&lt;p&gt;In the latest attack, the threat actors leveraged a set of Cloudflare credentials exposed in the Okta breach that were meant to be rotated but that the company overlooked. Those included a Moveworks service token that gave the attackers access to Cloudflare’s Atlassian system and credentials for three service accounts leaked in the Okta compromise: one used by the SaaS-based Smartsheet application with administrative access to our Atlassian Jira instance; another for a Bitbucket service account used to access Cloudflare’s source-code management system; and a final set of credentials for an AWS environment with no global access —and no customer data or other sensitive data, Cloudflare said.&lt;/p&gt; 
&lt;p&gt;With those credentials in hand, the threat actors had what they needed to establish a beachhead within Cloudflare’s environment with administrative access to Atlassian Jira. That allowed the threat actors to leverage the Atlassian Bitbucket Git archive feature to download the 76 repositories to the Atlassian server, from which they could be exfiltrated to an external source. While Cloudflare said it does not have proof that the repositories were exfiltrated, it assumes they were.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;According to the post, the repositories that were downloaded contained source code related to key Cloudflare functions, including how backups work, how the company’s global network is configured and managed, and how Cloudflare manages identity and remote access. There was also code related to Cloudflare’s use of Terraform and Kubernetes. (Terraform is an infrastructure-as-code application made by HashiCorp.)&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Cloudflare was quick to point out that customer data was not compromised in the attack, noting the following in its post about the incident:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“We saw no evidence whatsoever that the threat actor got access to our global network, data centers, SSL keys, customer databases or configuration information. …Their access was limited to the Atlassian suite and the server on which our Atlassian runs.&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;It's no secret that stolen code can be a problem&amp;nbsp;&lt;/h2&gt; 
&lt;p&gt;If Cloudflare’s actual operating environment and customer data weren’t compromised, is the theft of raw source code a concern? The answer, say security experts, is "yes."&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Ashlee Benge, Director of Threat Intelligence at ReversingLabs, said leaked source-code could include exploitable software vulnerabilities, plaintext passwords, certificates used for authentication, and more.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"There is a lot of stuff hidden in source code."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/ashleebenge/"&gt;Ashlee Benge&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Eric Milam, senior cyber security executive at ReversingLabs, said that with access to the raw source code, attackers can also gain an intimate knowledge of how a company’s systems fit together.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Removing the black box is another big advantage that may show its weakness over time."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/eric-milam/"&gt;Eric Milam&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Even as Cloudflare cast doubt on the raw value of the code itself in its post, the company acknowledged the risks of exposed secrets and code flaws.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt; “Our focus was not on someone having access to the source code, but whether that source code contained embedded secrets (such as a key or token) and vulnerabilities. [However], a small number of the repositories contained encrypted secrets, which were rotated immediately even though they were strongly encrypted themselves.”&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;In &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;the wake of the attack, in &lt;/span&gt;an internal all-hands-on-deck effort &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;dubbed&lt;/span&gt;&lt;/span&gt; Code Red (no, not &lt;/span&gt;&lt;a href="https://web.archive.org/web/20110617101100/http://news.cnet.com/2009-1001-270471.html" style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;that Code Red&lt;/a&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;), Cloudflare directed its engineering teams to scour the stolen source-code repositories for code vulnerabilities and other avenues for a malicious actor to “mount a subsequent attack.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;That robust effort to remediate the attack may prove sufficient to ward off follow-on attacks leveraging secrets or intelligence gained from the source code. However, Cloudflare should be on guard for the myriad ways that exposed code might undermine its security. Those range from references to particular staff or developers that might lurk in source code comments, or metadata and that could provide valuable intelligence for future attacks.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&amp;nbsp;“I would be preparing to spearfish them after the buzz had died down about this compromise."&lt;br&gt;—Ashlee Benge&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Third-party risk and the scourge of leaked secrets&lt;/h2&gt; 
&lt;p&gt;This latest Cloudflare incident underscores the continuing risks to organizations posed by both third-party software and leaks of development secrets alike.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Cloudflare’s zero-trust security model appears to have greatly limited the scope of the breach (at least by the company’s account). However, attackers' ability to leverage credentials stolen from a third-party identity provider (Okta) and gain persistent access to Cloudflare’s development environment underscores the acute exposure that even sophisticated firms have by way of third-party providers. A similar lesson lurked in the January 2023 &lt;a href="https://www.reversinglabs.com/blog/circleci-hack-is-a-red-flag-for-security-teams-on-the-software-supply-chain"&gt;disclosure by the firm CircleCI &lt;span&gt;that it had been compromised&lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.scmagazine.com/perspective/three-lessons-for-devops-from-the-circleci-breach"&gt;&lt;span&gt;.&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;Being prepared means being aware of what secrets and risks lurk in your code. ReversingLabs' &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;State of Software Supply Chain Security 2024&lt;/a&gt; reported the discovery of 40,000 secrets leaked in 2023 alone from four major open-source platforms: npm, PyPI, RubyGems, and NuGet. Those included embedded and encrypted private keys, web service API keys and access credentials, and plaintext credentials buried in network protocol strings.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;While not all such credentials pose a security risk (placeholder and expired credentials may not pose any risk), organizations need to be aware of the security exposure that source code poses and the varieties of sensitive information that may lurk in both open-source and proprietary code repositories.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fcloudflare-source-code-breach-lessons-learned&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 06 Feb 2024 13:00:00 GMT</pubDate>
      <author>paul.roberts@reversinglabs.com (Paul Roberts)</author>
      <guid>https://www.reversinglabs.com/blog/cloudflare-source-code-breach-lessons-learned</guid>
      <dc:date>2024-02-06T13:00:00Z</dc:date>
    </item>
    <item>
      <title>CISO accountability in the era of software supply chain security</title>
      <link>https://www.reversinglabs.com/blog/ciso-accountability-in-the-era-of-software-supply-chain-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/ciso-accountability-in-the-era-of-software-supply-chain-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/ciso-liability-seize-the-day.jpg" alt="CISO accountability in the era of software supply chain security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity leaders are well aware that the industry is constantly evolving. Whether dealing with the kinds of threats organizations face or the security tools best fit to mitigate them, today’s leaders understand that they have to stay on their toes. But in just the past few years, there has been considerable change in one role specifically: the chief information security officer (CISO).&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/ciso-liability-seize-the-day.jpg?width=1400&amp;amp;height=732&amp;amp;name=ciso-liability-seize-the-day.jpg" width="1400" height="732" alt="ciso-liability-seize-the-day" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Cybersecurity leaders are well aware that the industry is constantly evolving. Whether dealing with the kinds of threats organizations face or the security tools best fit to mitigate them, today’s leaders understand that they have to stay on their toes. But in just the past few years, there has been considerable change in one role specifically: the chief information security officer (CISO).&lt;/p&gt;  
&lt;p&gt;The way in which a typical CISO functions today is quite different from how a CISO would have conducted business in 2020. This is because the cybersecurity industry was forever changed by &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;SunBurst, the software supply chain attack on SolarWinds’ Orion software&lt;/a&gt; in late 2020. That incident not only put &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report"&gt;software supply chain security and third-party risk management (TPRM)&lt;/a&gt; on the map, but also served as a paradigm shift for CISOs.&lt;/p&gt; 
&lt;p&gt;As those of us who have served as CISOs know, there is a constant tension between security, controls, and the business’s objectives; CISOs are expected to not head an “organization of no.” Prior to SunBurst, it was considered common practice for CISOs to have their security reports “prettied up” by marketing and PR teams for public presentation. More often than not, that resulted in their statements to be watered-down or lose their meaning. Even worse: Cleaned-up language might fail to capture the true state of security at their organizations. Doing this kind of whitewashing only a few years ago was the norm for publicly traded firms, which faced few if any consequences — legal or otherwise — for such activity.&lt;/p&gt; 
&lt;p&gt;These expectations for the CISO took a dramatic turn in October 2023, when the &lt;a href="https://www.sec.gov/news/press-release/2023-227?utm_source=danielmiessler.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=sec-vs-solarwinds-is-cybersecurity-s-enron-moment"&gt;U.S. Securities and Exchange Commission (SEC) charged SolarWinds and its CISO&lt;/a&gt;, Timothy G. Brown, with fraud and internal control failures, alleging that the company “misled investors about its cybersecurity practices and known risks” in relation to the 2020 SunBurst incident. From the outside looking in, it seems as though Brown is being held personally liable for what had been considered common practice by many CISOs and their organizations.&lt;/p&gt; 
&lt;p&gt;Historically, the controls available to CISOs to ensure that commercial off-the-shelf (COTS) and other third-party components didn’t bring unacceptable risks into their corporate environments were generally limited to questionnaire-based surveys, rudimentary contract language, and technical security reviews (e.g., manual penetration tests). But today, these controls are seen as highly ineffective and unscalable in finding the types of risks we’ve seen in significant breaches in addition to SunBurst, such as &lt;a href="https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update"&gt;&lt;span&gt;3CX&lt;/span&gt;&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/after-russian-arrests-revil-rolls-on"&gt;Kaseya&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/after-hack-circleci-tells-devs-to-update-secrets-now"&gt;&lt;span&gt;CircleCI&lt;/span&gt;&lt;/a&gt;, MOVEit, etc.&lt;/p&gt; 
&lt;p&gt;This new precedent brought forth by the SEC is now the defining event between two time periods. In this new era, which consists of concern for &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;&lt;span&gt;software supply chain security&lt;/span&gt;&lt;/a&gt; and newfound accountability, CISOs are now personally and financially responsible for the security outcomes of their enterprises’ security programs. Therefore, misrepresentation about the state of security at an organization is no longer acceptable.&lt;/p&gt; 
&lt;p&gt;Here's what CISOs need to know in this new era — and how they can leverage their new responsibility to prioritize security within their organization.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;[ Webinar: Saša Zdjelar and Daniel Miessler discuss &lt;a href="https://www.reversinglabs.com/webinar/the-cyber-cfo-ciso-accountability-in-the-new-era-of-sscs"&gt;CISO accountability in the new era &lt;/a&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;|&lt;/span&gt;&lt;span style="font-weight: normal;"&gt; &lt;span style="font-weight: bold;"&gt;See related: &lt;a href="https://www.reversinglabs.com/blog/high-profile-breach-disclosures-spotlight-new-era-of-ciso-liability"&gt;HPE, Microsoft breach disclosures mark new era for CISOs&lt;/a&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;The new CISO: A cyber-CFO?&lt;/h2&gt; 
&lt;p&gt;To better understand this new level of scrutiny in the cybersecurity industry, it’s best to compare the newfound personal liability of a CISO to what is expected of a modern-day chief financial officer (CFO). Back in the early 2000s, the finance industry had its own paradigm shift, when the now-defunct energy company Enron collapsed, revealing a wide range of financial improprieties. Eventually, the company’s former CFO, &lt;a href="https://www.sec.gov/litigation/litreleases/lr-18543"&gt;&lt;span&gt;Andy Fastow, was convicted by the SEC,&lt;/span&gt;&lt;/a&gt; in October 2002, on several serious charges, including “inflating the value of Enron’s investments.”&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The SEC’s case against Brown and SolarWinds will “be like our (cybersecurity’s) Enron moment,” my friend &lt;a href="https://www.linkedin.com/in/danielmiessler/"&gt;Daniel Miessler&lt;/a&gt; shared in &lt;a href="https://danielmiessler.com/p/sec-vs-solarwinds-cybersecuritys-enron-moment"&gt;his writing about the SEC’s case against Tim Brown. &lt;/a&gt;That’s not in the sense of the alleged offense committed, but the reaction it spawns in regulators, he wrote.&lt;/p&gt; 
&lt;p&gt;Miessler and I agree that in this new era of scrutiny, CISOs will have to carry themselves in a similar manner to a CFO in the post-Enron world, making the modern cybersecurity leader more akin to a “cyber-CFO.” Rather than just being concerned about the enterprise’s security, cyber-leaders will likely be held personally liable for security assertions and external reporting and will be subject to regulatory standards, etc. – just as&amp;nbsp;a CFO is today as a result of Enron and the subsequent &lt;a href="https://www.congress.gov/bill/107th-congress/house-bill/3763"&gt;&lt;span&gt;Sarbanes-Oxley Act&lt;/span&gt;&lt;/a&gt; of 2002.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;This is why I believe the following four changes will come (or have already come) for today’s CISOs:&lt;/p&gt; 
&lt;h3 style="font-weight: normal;"&gt;1. Careful drafting training for all execs&lt;/h3&gt; 
&lt;p&gt;There will be careful drafting training for senior executives, inclusive of CISOs and possibly the whole company. There will be a newfound priority within the C-suite to be extra careful regarding what is said and how it is said, both verbally and in writing, internally and externally.&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;2. Well-rounded CISO candidates will rise up&lt;/h3&gt; 
&lt;p&gt;CISO candidates with multidisciplinary and well-rounded backgrounds are more likely to be considered for these positions. Enterprises want CISO roles filled by seasoned security leaders who are also business-savvy. This is because security leaders with this kind of diverse background will have a better understanding of personal liability in the areas of financial and fiduciary responsibility.&amp;nbsp;&lt;span style="font-size: 11px; color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h3&gt;3. Seniority will come with the new responsibility&lt;/h3&gt; 
&lt;p&gt;The CISO will be a more senior executive than previously thought and will be expected to have a broad consideration for risk. The work and responsibilities of a CISO will be taken just as seriously as those of the CFO, and CISOs may even become a &lt;a href="https://www.sec.gov/education/smallbusiness/goingpublic/officersanddirectors"&gt;Section 16 officer&lt;/a&gt; of the company. Any CISO who isn’t willing to do will find that others will gladly take their place.&lt;span style="font-size: 11px; color: #000000;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h3&gt;4. CISOs will have the final word&lt;/h3&gt; 
&lt;p&gt;CISOs will have the final word for their internal and external communications regarding the company’s security practices. Enterprises do not want to be held legally accountable for watering down the CISO’s factual messages about the company’s state of security.&lt;/p&gt; 
&lt;h2&gt;CISOs can use this new responsibility to prioritize security&lt;/h2&gt; 
&lt;p&gt;All of the above changes are why a CISO now needs to start acting like a CFO on their very first day in the role. CISOs no longer have the freedom to prioritize business interests and subordinate cybersecurity, because they will be found liable for misrepresenting security practices in the event of a cyber-incident. CFOs can’t let some fraud, financial crime, absence of key stated controls, or insider dealing go while they ease into the role, and CISOs will need to start acting the same way regarding their company’s security program.&lt;/p&gt; 
&lt;p&gt;While some may find this new era of CISO accountability a threat, they need to look at the massive opportunity as well — and the opportunity is quite big! Yes, CISOs will have more work to do with this new level of scrutiny and accountability. However, this new era will allow them to take a more senior and influential role in the organization, receive greater allocations of resources to maintain an appropriate level of perceived risk, prioritize critical enterprise security needs, and be fully transparent on what security issues their company is dealing with.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;And because CISOs and their respective companies will be more transparent and accountable, this should lead to greater trust in them from customers, board members, investors, employees, regulators, and the communities in which they operate.&lt;/p&gt; 
&lt;p&gt;To all of the CISOs out there, this is your moment to seize the day!&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;[ Join the discussion on February 6 @ 11am EST with Saša Zdjelar and Daniel Miessler about &lt;a href="https://www.reversinglabs.com/webinar/the-cyber-cfo-ciso-accountability-in-the-new-era-of-sscs"&gt;CISO accountability in the era of software supply chain security&lt;/a&gt; ]&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fciso-accountability-in-the-era-of-software-supply-chain-security&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Mon, 05 Feb 2024 19:45:00 GMT</pubDate>
      <author>sasa.zdjelar@reversinglabs.com (Saša Zdjelar)</author>
      <guid>https://www.reversinglabs.com/blog/ciso-accountability-in-the-era-of-software-supply-chain-security</guid>
      <dc:date>2024-02-05T19:45:00Z</dc:date>
    </item>
    <item>
      <title>Lessons from the Mercedes-Benz GitHub source code leak</title>
      <link>https://www.reversinglabs.com/blog/lessons-from-the-mercedes-benz-github-source-code-leak</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/lessons-from-the-mercedes-benz-github-source-code-leak" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Mercedes-Benz-Gensler-HQ.jpg" alt="Lessons from the Mercedes-Benz GitHub source code leak" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Mercedes-Benz-Gensler-HQ.jpg?width=1400&amp;amp;height=732&amp;amp;name=Mercedes-Benz-Gensler-HQ.jpg" width="1400" height="732" alt="Mercedes-Benz-Gensler-HQ" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p style="text-align: left;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;The German automotive giant Mercedes-Benz found itself on the wrong end of a software supply chain incident after RedHunt Labs found a leaked GitHub token belonging to an employee of the carmaker that granted "'unrestricted’ and 'unmonitored'" access to the entirety of source code hosted on Mercedes’ internal GitHub Enterprise Server.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;/span&gt;In a &lt;a href="https://redhuntlabs.com/blog/mercedes-benz-source-code-at-risk-github-token-mishap-sparks-major-security-concerns/"&gt;&lt;span&gt;post published on Monday&lt;/span&gt;&lt;/a&gt;, RedHunt Labs said that the exposed token “laid bare sensitive repositories housing a wealth of intellectual property.” That included Mercedes’ “Database Connection Strings, Cloud Access Keys, Blueprints, Design Documents, SSO Passwords, API Keys, and Other Critical internal information.”&lt;/p&gt; 
&lt;p&gt;The leaked GitHub access token was contained in a public GitHub repository belonging to the employee. In a statement &lt;a href="https://techcrunch.com/2024/01/26/mercedez-benz-token-exposed-source-code-github/"&gt;issued to &lt;em&gt;TechCrunch&lt;/em&gt;&lt;/a&gt;, a Mercedes representative Katja Liesenfeld acknowledged the security lapse. The statement came after the publication informed Mercedes-Benz of RedHunt’s discovery. Mercedes revoked the leaked API token and removed the public repository immediately.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“We can confirm that internal source code was published on a public GitHub repository by human error. The security of our organization, products, and services is one of our top priorities. We will continue to analyze this case according to our normal processes. Depending on this, we [may] implement remedial measures."&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Here's what we know about the source code leak — and lessons to draw from it.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Key takeaways: &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;State of Software Supply Chain Security 2024&lt;/a&gt; | Get the &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;full report&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;Leaked development secrets: A common problem&lt;/h2&gt; 
&lt;p&gt;Leaked secrets are a problem facing many organizations amidst the shift to modern, agile development with its heavy reliance on open source, third party codes, and platforms. ReversingLabs most recent &lt;a href="https://3375217.hubspotpreview-na1.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;State of Software Supply Chain Security report,&lt;/a&gt; for example, found more than 40,000 secrets spread across four major open-source repositories: npm, PyPI, RubyGems, and NuGet.&lt;/p&gt; 
&lt;p&gt;In many cases, loose developer practices and the absence of adequate checks for both raw and compiled code were the reason for the security exposure. For example, in the many cases of secret leaks via open source platforms that ReversingLabs observed during 2023, developers placed access tokens in their code or in comments to streamline publishing to these platforms. However, many forgot to remove these access tokens prior to uploading their code. For example, ReversingLabs found a package on an open-source repository with a “notes” file that included the developer’s log along with several tokens.&lt;/p&gt; 
&lt;h2&gt;Mercedes-Benz and security: The best or nothing?&lt;/h2&gt; 
&lt;p&gt;This isn’t the first time Mercedes-Benz has been tripped up by software supply chain security blunders. In May, 2020, for example, &lt;span&gt;ZDNet reported&lt;/span&gt; that &lt;a href="https://www.zdnet.com/article/mercedes-benz-onboard-logic-unit-olu-source-code-leaks-online/"&gt;source code used in smart car components designed by Mercedes-Benz was exposed online&lt;/a&gt; as a result of a misconfigured Git registration system.&lt;/p&gt; 
&lt;p&gt;In that incident, Till Kottmann, a software engineer based in Switzerland, discovered a Git web portal belonging to Daimler AG, Mercedes-Benz’s parent company. According to the ZDNet report, Kottmann said he was able to register an account on Daimler's code-hosting portal, and then download more than 580 Git repositories containing the source code of onboard logic units (OLUs) installed in Mercedes vans.&lt;/p&gt; 
&lt;p&gt;In January, Mercedes-Benz also featured prominently in the report &lt;a href="https://samcurry.net/web-hackers-vs-the-auto-industry/"&gt;&lt;span&gt;Web Hackers Versus The Auto Industry&lt;/span&gt;&lt;/a&gt;, in which a group of independent security researchers led by Sam Curry &lt;a href="https://www.reversinglabs.com/blog/researchers-exploit-gaps-in-vehicle-software-supply-chain"&gt;gained access to hundreds of mission-critical internal Mercedes-Benz applications&lt;/a&gt; via improperly configured single sign-on servers. That included accessing multiple Mercedes-Benz Github instances; SonarQube, Jenkins and other build servers; internal cloud deployment services for managing AWS instances; and internal Vehicle related APIs.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;When every company is a software company&lt;/h2&gt; 
&lt;p&gt;The struggles of legacy automotive and industrial firms to adapt to a modern and quickly evolving cyber threat landscape are well documented. (Curry and team ultimately discovered serious issues at 19 different automakers and suppliers to the automotive industry.)&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;What is less appreciated is the way in which cyber risks like software supply chain security lapses can quickly become matters of life and death, said Saša Zdjelar, Chief Trust Officer at ReversingLabs.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Repositories such as GitHub can include software that eventually makes it to the vehicle as well (as part of the CAN, Car Area Network) and ultimately plays a role in safety and other critical systems such as breaking, sensing, steering, security (eg. Alarm, locking/unlocking), location/tracking, etc. not just media and entertainment."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/sasazdjelar/"&gt;Saša Zdjelar&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;That raises the stakes for companies like Mercedes-Benz to prioritize software supply chain security.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;“It’s more critical than ever in world of escalating software supply chain breaches such as this one that companies can attest to regulators, customers, and investors that their software is free of malware; hasn’t been tampered with by a malicious actor; is cryptographically sound; doesn’t include embedded secrets; doesn’t exhibit overly permissive behaviors (including network connections to nefarious hosts); and has been compiled with appropriate hardening and secure configuration.”&amp;nbsp;&lt;br&gt;—Saša Zdjelar&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Supply chain security must go beyond legacy AppSec&lt;/h2&gt; 
&lt;p&gt;Traditional application security tools such as static- and dynamic-application security testing (SAST and DAST), and software composition analysis (SCA) products generally &lt;a href="https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security"&gt;overlook such threats because they were designed in a different era&lt;/a&gt; and for different purposes, he said.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;But pressure is mounting on companies like Mercedes to address gaps in detection and awareness around software supply chain risk. In its October 2023 report, &lt;a href="https://www.reversinglabs.com/gartner-report-mitigate-enterprise-software-supply-chain-security-risks"&gt;Mitigate Enterprise Software Supply Chain Security Risks&lt;/a&gt;, the analyst firm Gartner noted that the presence of operational and &lt;a href="https://www.reversinglabs.com/blog/supply-chain-security-debt-weighing-down"&gt;supply chain risks including technical debt and software&lt;/a&gt; are “lacking appropriate security controls and checks. Poor maintenance and security hygiene practices suggest an increased risk of vulnerabilities, project abandonment, and other risks at some point in the future.”&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Flessons-from-the-mercedes-benz-github-source-code-leak&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 01 Feb 2024 13:00:00 GMT</pubDate>
      <author>paul.roberts@reversinglabs.com (Paul Roberts)</author>
      <guid>https://www.reversinglabs.com/blog/lessons-from-the-mercedes-benz-github-source-code-leak</guid>
      <dc:date>2024-02-01T13:00:00Z</dc:date>
    </item>
    <item>
      <title>HPE, Microsoft breach disclosures mark new era of CISO accountability</title>
      <link>https://www.reversinglabs.com/blog/high-profile-breach-disclosures-spotlight-new-era-of-ciso-liability</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/high-profile-breach-disclosures-spotlight-new-era-of-ciso-liability" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/SEC-CISO-accountability.jpg" alt="HPE, Microsoft breach disclosures spotlight new era of CISO liability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;Disclosures about cybersecurity breaches by Microsoft and Hewlett Packard Enterprise (HPE) underscore the influence of two entities that are reshaping the cybersecurity landscape: the SVR and the SEC: Russia’s Foreign Intelligence Service&amp;nbsp;and the U.S. Securities and Exchange Commission.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/SEC-CISO-accountability.jpg?width=1400&amp;amp;height=732&amp;amp;name=SEC-CISO-accountability.jpg" width="1400" height="732" alt="SEC-CISO-accountability" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;Disclosures about cybersecurity breaches by Microsoft and Hewlett Packard Enterprise (HPE) underscore the influence of two entities that are reshaping the cybersecurity landscape: the SVR and the SEC: Russia’s Foreign Intelligence Service&amp;nbsp;and the U.S. Securities and Exchange Commission.&amp;nbsp;&lt;/p&gt;  
&lt;p style="text-align: left;"&gt;Increasingly sophisticated hacks by state-sponsored groups such as the SVR, coupled with tighter disclosure requirements, are poised to drive a flurry of legal filings tied to cybersecurity incidents, throwing long-needed sunlight on the struggles of leading corporations to secure their environments, IT assets, and sensitive customer data.&lt;/p&gt; 
&lt;p&gt;And those firms' chief information security officers (CISOs) are also on notice, following&lt;span&gt; the SEC's recent&lt;/span&gt;&lt;a href="https://www.sec.gov/news/press-release/2023-227?utm_source=danielmiessler.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=sec-vs-solarwinds-is-cybersecurity-s-enron-moment"&gt;&lt;span&gt; charges against SolarWinds and its CISO&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Timothy G. Brown, for fraud and internal control failures, alleging that the company “misled investors about its cybersecurity practices and known risks” in relation to the &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;2020 SunBurst attack on SolarWinds&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Here's why this new reality should raise the eyebrows of enterprise leaders — and of CISOs in particular.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;[ See Saša Zdjelar's post: &lt;a href="https://www.reversinglabs.com/blog/ciso-accountability-in-the-era-of-software-supply-chain-security"&gt;CISO accountability in the era of software supply chain&lt;/a&gt; | Join Webinar: &lt;a href="https://www.reversinglabs.com/webinar/the-cyber-cfo-ciso-accountability-in-the-new-era-of-sscs"&gt;The Cyber CFO | CISOs and the New Era&lt;/a&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Pwning 365&lt;/h2&gt; 
&lt;p&gt;First, the hacks. According to statements from Microsoft and HPE, hackers believed to be part of the advanced persistent threat (APT) group Cozy Bear compromised cloud-based email accounts used by the two companies in attacks targeting high-value email inboxes belonging to cybersecurity and legal experts at the companies, as well as senior executives.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;In &lt;a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/789019/000119312524011295/d708866d8k.htm"&gt;&lt;span&gt;an SEC filing&lt;/span&gt;&lt;/a&gt; dated January 17, Microsoft said that it detected the presence of a “nation-state associated threat actor” on Jan 12, that “gained access to and exfiltrated information from” the employees’ email accounts. The attack is believed to have begun in November 2023. Microsoft said it is still investigating the extent of the incident and analyzing the information stolen while it works with law enforcement.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;A detailed analysis of the incident &lt;a href="https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/"&gt;published on Thursday by the company’s Threat Intelligence Team&lt;/a&gt;&amp;nbsp; described a sophisticated attack that began with the compromise of a “legacy, non-product test tenant account” using carefully calibrated “password spray attacks.” Password spraying is a process by which malicious actors use automated means to try to guess their way into protected accounts using lists of common passwords.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Once inside, the intruders gained full access to Office 365 Exchange Online, facilitating the compromise of the users' email inboxes. "Midnight Blizzard leveraged their initial access to identify and compromise a legacy test OAuth application that had elevated access to the Microsoft corporate environment,” Microsoft wrote.&lt;/p&gt; 
&lt;p&gt;Fewer details are known about the attack on HPE. The company's SEC statement, filed a couple of days after Microsoft’s, on January 19, simply states that the company was notified on December 12, 2023, that a “suspected nation-state actor, described as the threat actor Midnight Blizzard (another name for Cozy Bear) gained unauthorized access to HPE’s “cloud-based email environment” — presumably being Microsoft Office 365.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;HPE also said the latest incident is likely part of an even larger hack dating to June 2023, involving “unauthorized access to and exfiltration of a limited number of SharePoint files” as early as May 2023. HPE said that it investigated that breach at the time but found that it was not a major threat. “Undertaking such actions, we determined that such activity did not materially impact the company,” HPE said.&lt;/p&gt; 
&lt;h2&gt;The SEC and 'materiality': The clock is ticking&lt;/h2&gt; 
&lt;p&gt;How is it that a successful attack in June on a small number of SharePoint files wasn’t deemed “material” to HPE, but a related attack a few months later on a small number of Microsoft 365 email accounts was? Credit new rules&lt;a href="https://www.sec.gov/news/statement/gerding-cybersecurity-disclosure-20231214"&gt;&lt;span&gt; adopted by the SEC in July,&lt;/span&gt;&lt;/a&gt; some of which went into effect in December.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Those changes saw the SEC redefine requirements for what public companies must disclose with regard to cybersecurity incidents and — even more important — when they must disclose them. Specifically, the SEC’s final rule requires public companies to disclose “the occurrence of a material cybersecurity incident and describe the material aspects of the nature, scope, and timing of the incident, as well as the material impact or reasonably likely material impact of the incident on the company, including its financial condition and results of operations.”&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;As to when an incident must be disclosed, the new SEC guidelines state that public companies must provide “the required cybersecurity incident disclosure &lt;em&gt;within four business days&lt;/em&gt; after the company &lt;em&gt;determines the incident to be material&lt;/em&gt;” — an internal inquiry that must take place “without unreasonable delay.”&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The notion of “materiality” is a bit squishy, but it broadly defines any information that “a reasonable person would consider important when making an investment decision,” or information that would significantly affect what the SEC describes as the “total mix” of existing public information available about a company. Any doubts about whether information is material “should be resolved in the favor of the investor,” the SEC states.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The new SEC guidelines clearly influenced the disclosures by Microsoft and HPE in this incident. Microsoft, for example, indicated in its SEC filing that it didn’t believe the event was “material” to the company’s operations, but “the Company has not yet determined whether the incident is reasonably likely to materially impact the Company’s financial condition or results of operations.”&lt;/p&gt; 
&lt;p&gt;HPE said in its filing that “as of the date of this filing, the incident has not had a material impact on the Company’s operations, and the Company has not determined the incident is reasonably likely to materially impact the Company’s financial condition or results of operations.”&lt;/p&gt; 
&lt;h2&gt;So what has changed? The attack on SolarWinds&lt;/h2&gt; 
&lt;p&gt;So why disclose incidents that are “non material”? Simple: the attack on SolarWinds. The &lt;a href="https://www.sec.gov/news/press-release/2023-227"&gt;recent SEC case &lt;/a&gt;against that company and its CISO Brown alleges that SolarWinds and Brown “defrauded investors by overstating SolarWinds' cybersecurity practices and understating or failing to disclose known risks.”&lt;/p&gt; 
&lt;p&gt;In its filings with the commission during this period, the SEC stated, SolarWinds allegedly misled investors by disclosing only generic and hypothetical risks at a time when the company and Brown knew of specific deficiencies in SolarWinds’ cybersecurity practices, as well as the increasingly elevated risks the company faced at the same time. The group behind the attack on SolarWinds? You guessed it: Cozy Bear.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;In other words, for both Microsoft and HPE, a first-take assessment of the most recent incidents may suggest that the operations of those massive, wealthy firms are not materially impacted. However, the SVR’s track record for rooting itself deep inside enterprises and finding novel ways to undermine the security of both them and their customers can’t be taken lightly. That recognition, coupled with the SEC’s tighter breach disclosure requirements and the specter of both corporate and individual fraud charges, tips the scales in favor of disclosure, shedding much needed daylight on incidents that were regularly shrouded in secrecy.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;As we all know, sunlight is a disinfectant. The long-term effects of that on the overall security of our technology ecosystem should see some benefit.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;More disclosures to come?&amp;nbsp;&lt;/h2&gt; 
&lt;p&gt;The story probably won’t end here. &lt;a href="https://www.washingtonpost.com/technology/2024/01/26/russia-hacks-sec-disclosures/" style="font-style: italic;"&gt;&lt;span&gt;Writing for The Washington Post&lt;/span&gt;&lt;/a&gt;, Joseph Menn reported that sources inside and outside of the government put the number of affected companies at “more than 10” and “perhaps far more.”&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The Cozy Bear attacks come amid heightened offensive hacking activity linked to state-sponsored hacking groups. A ReversingLabs researcher familiar with the work of&amp;nbsp;Russian state actors noted the timing of the hacks:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“This kind of espionage activity is to be expected in times of unrest. Threat actors seek to gain access to privileged accounts with access to sensitive code or information to get the best payout for their efforts.”&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Looking further down the road: A threat actor that was able to successfully compromise either Microsoft or HPE’s software supply chain, as happened in the attack on SolarWinds, could potentially gain the ability to push malware directly to the users of those companies' many products, the ReversingLabs researcher said.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fhigh-profile-breach-disclosures-spotlight-new-era-of-ciso-liability&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Operations</category>
      <category>Risk &amp; Compliance</category>
      <pubDate>Tue, 30 Jan 2024 13:00:00 GMT</pubDate>
      <author>paul.roberts@reversinglabs.com (Paul Roberts)</author>
      <guid>https://www.reversinglabs.com/blog/high-profile-breach-disclosures-spotlight-new-era-of-ciso-liability</guid>
      <dc:date>2024-01-30T13:00:00Z</dc:date>
    </item>
    <item>
      <title>GitGot: GitHub leveraged by cybercriminals to store stolen data</title>
      <link>https://www.reversinglabs.com/blog/gitgot-cybercriminals-using-github-to-store-stolen-data</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/gitgot-cybercriminals-using-github-to-store-stolen-data" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/GitGot.webp" alt="GitGot: GitHub leveraged by cybercriminals to store stolen data" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;ReversingLabs researchers have discovered two malicious packages on the npm open source package manager that leverages GitHub to store stolen Base64-encrypted SSH keys lifted from developer systems that installed the malicious npm packages.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/GitGot.webp?width=1400&amp;amp;height=732&amp;amp;name=GitGot.webp" width="1400" height="732" alt="GitGot" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;ReversingLabs researchers have discovered two malicious packages on the npm open source package manager that leverages GitHub to store stolen Base64-encrypted SSH keys lifted from developer systems that installed the malicious npm packages.&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;Multiple versions of the malicious npm packages, &lt;em&gt;warbeast2000&lt;/em&gt; and &lt;em&gt;kodiak2k &lt;/em&gt;were identified in January, and have since been removed from npm. However, the campaign is just the latest example of cybercriminals and malicious actors using open source package managers and related infrastructure to support malicious software supply chain campaigns that target development organizations and end-user organizations.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Discussion: Malicious packages target developer SSH keys&lt;/h2&gt; 
&lt;p&gt;In recent years, open source package managers and code repositories became ground zero for malicious campaigns. As noted in ReversingLabs' new report, &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;, the number of malicious packages found on open source package managers jumped 1,300% between 2020 and the end of 2023. That includes everything from low-threat &lt;a href="https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza"&gt;protestware&lt;/a&gt;&amp;nbsp;and &lt;a href="https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks"&gt;automated phishing campaigns&lt;/a&gt; to more subtle malicious campaigns delivering malware, &lt;a href="https://www.reversinglabs.com/blog/r77-rootkit-typosquatting-npm-threat-research"&gt;like the r77 rootkit&lt;/a&gt;, directly from open source packages.&lt;/p&gt; 
&lt;h2&gt;Packages on npm grab private keys&lt;/h2&gt; 
&lt;p&gt;In recent weeks, ReversingLabs researchers discovered two suspicious npm packages named &lt;em&gt;warbeast2000&lt;/em&gt; and &lt;em&gt;kodiak2k&lt;/em&gt;. Here’s what the research team knows about each.&lt;/p&gt; 
&lt;h3 style="font-weight: bold; font-size: 20px;"&gt;warbeast2000&lt;/h3&gt; 
&lt;p&gt;On January 3, ReversingLabs researchers using the company's Software Supply Chain Security platform identified a package, &lt;em&gt;warbeast2000&lt;/em&gt;, which was suspicious and appeared to be malicious. The package, in itself, was not very complicated. It contained just a few components. The corresponding npm page for warbeast2000 was basic and not obviously mimicking another package.&lt;/p&gt; 
&lt;p&gt;Furthermore, at the time it was discovered, &lt;em&gt;warbeast2000 &lt;/em&gt;was in the process of being developed. There were eight versions (1.0.0 - 1.0.8), with new elements being added to the package with each new version. Malicious functionality was only observed in the last, posted version of the package.&amp;nbsp;&lt;br&gt;&lt;br&gt;It appears that the package author was in the process of building out the malware and adding layers of deception. Fortunately, the package was detected and removed from npm before that could happen.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/blog-GitGot-figure-1.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/blog-GitGot-figure-1.webp?width=1400&amp;amp;name=blog-GitGot-figure-1.webp" alt="Postinstall script" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 1: Postinstall script&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;What did &lt;em&gt;warbeast2000 &lt;/em&gt;do? Based on our analysis of the final version of the package, once it was installed on a victim's computer, it would launch a postinstall script that fetched and executed a javascript file. This second stage malicious script read the private ssh key stored in the &amp;nbsp;&lt;em&gt;id_rsa&lt;/em&gt; file located in the &lt;em&gt;&amp;lt;homedir&amp;gt;/.ssh&lt;/em&gt; directory. It then uploaded the Base64 encoded key to an attacker-controlled GitHub repository. And that was it. Besides grabbing and copying the id_rsa SSH key, the package displayed no other behaviors.&lt;br&gt;&lt;br&gt;The choice of the &lt;span style="font-style: italic;"&gt;id_rsa&lt;/span&gt; key was a natural one, as &lt;span style="font-style: italic;"&gt;id_rsa&lt;/span&gt; is the &lt;a href="https://git-scm.com/book/en/v2/Git-on-the-Server-Generating-Your-SSH-Public-Key"&gt;default file name given to ssh keys&lt;/a&gt; when running the ssh-keygen program, a standard component of the SSH package on Linux and macOS systems as well as with Git for Windows.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/blog-GitGot-figure-2.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/blog-GitGot-figure-2.webp?width=1400&amp;amp;name=blog-GitGot-figure-2.webp" alt="Malicious second stage from warbeast2000" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 2: Malicious second stage from warbeast2000&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;As noted, the &lt;em&gt;warbeast2000&lt;/em&gt; package was probably still under development when it was detected, meaning that what was observed may not be the fully conceived package. It is possible, for example, that the entire contents of the &lt;em&gt;.ssh&lt;/em&gt; folder would be sent to a GitHub repository owned by a malicious actor.&amp;nbsp;&lt;br&gt;&lt;br&gt;The &lt;em&gt;warbeast2000&lt;/em&gt; package was reported to npm administrators and removed on or around January 3.&amp;nbsp;&lt;/p&gt; 
&lt;h3 style="font-size: 20px;"&gt;&lt;span style="font-weight: bold;"&gt;Kodiak2k&lt;/span&gt;&lt;/h3&gt; 
&lt;p&gt;Shortly after discovering the &lt;span style="font-style: italic;"&gt;warbeast2000&lt;/span&gt; package, on January 5, the ReversingLabs Software Supply Chain Security platform identified another npm package with very similar behavior: &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt;. Unlike &lt;span style="font-style: italic;"&gt;warbeast2000,&lt;/span&gt; &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt; had more than 30 different versions and, apart from the first few, all of them were malicious.&amp;nbsp;&lt;br&gt;&lt;br&gt;Similar to &lt;span style="font-style: italic;"&gt;warbeast2000&lt;/span&gt;, &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt; runs a &lt;span style="font-style: italic;"&gt;postinstall&lt;/span&gt; script after the package is installed. That script downloads another javascript file and executes it. As with &lt;span style="font-style: italic;"&gt;warbeast2000,&lt;/span&gt; that script reads the contents of &lt;span style="font-style: italic;"&gt;&amp;lt;homedir&amp;gt;/.ssh&lt;/span&gt; directory, though the script is looking for a key named &lt;span style="font-style: italic;"&gt;meow&lt;/span&gt;. It is not clear whether the developer had a specific key in mind or (more likely) used meow as a place holder name while the package was under development.&lt;/p&gt; 
&lt;p&gt;Whatever the case, when and if the meow file was located, the key contained in it would be encoded in Base64 and uploaded to a GitHub repository, as with the warbeast2000 package.&lt;/p&gt; 
&lt;p&gt;Later versions of the &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt; package also executed a script found in an &lt;a href="https://github.com/EmpireProject/Empire"&gt;archived GitHub project&lt;/a&gt; containing the &lt;a href="https://github.com/EmpireProject/Empire"&gt;Empire post-exploitation framework&lt;/a&gt;. The script also invokes the Mimikatz hacking tool, which is commonly used to dump credentials from process memory. There was more activity, as well, across different versions with additional functions that weren’t necessarily malicious. For example, the team observed functions for running notepad.exe, shutdown.exe and an executable that was deployed locally named cryptor.exe. The purpose of these functions wasn’t clear, though it is possible that the malicious actor responsible for creating the &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt; package was in the process of testing different malicious functions for future integration into &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt;.&amp;nbsp;&lt;br&gt;&lt;br&gt;The &lt;span style="font-style: italic;"&gt;kodiak2k&lt;/span&gt; package was reported to npm administrators and removed on or around January 5.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/blog-GitGot-figure-3.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/blog-GitGot-figure-3.webp?width=1400&amp;amp;name=blog-GitGot-figure-3.webp" alt="Malicious second stage from kodiak2k" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 3: Malicious second stage from kodiak2k&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Keys to the kingdom&lt;/h2&gt; 
&lt;p&gt;Malicious actors looking to obtain SSH keys from developers is an alarming development. SSH keys provide those who hold them the ability to access and contribute to GitHub repositories, including those containing proprietary (non-public) code. As &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;attacks like those on SolarWinds&lt;/a&gt; and &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;3CX&lt;/a&gt; show, that level of access can have a serious and negative impact on the security of the software producer, as well as the end user organizations that deploy and use the affected software: &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;fueling devastating software supply chain attacks&lt;/a&gt;.&lt;/p&gt; 
&lt;h2&gt;Limited scope&lt;/h2&gt; 
&lt;p&gt;Fortunately, the reach of this campaign was limited. ReversingLabs observed different accounts publishing &lt;em&gt;warbeast2000 &lt;/em&gt;and &lt;em&gt;kodiak2k&lt;/em&gt; on npm. The &lt;em&gt;warbeast2000&lt;/em&gt; package was downloaded a little less than &lt;a href="https://npm-stat.com/charts.html?package=warbeast2000&amp;amp;from=2024-01-02&amp;amp;to=2024-01-03"&gt;400&lt;/a&gt; times, whereas the &lt;em&gt;kodiak2k &lt;/em&gt;was downloaded around &lt;a href="https://npm-stat.com/charts.html?package=kodiak2k&amp;amp;from=2024-01-03&amp;amp;to=2024-01-05"&gt;950&lt;/a&gt; times.&lt;/p&gt; 
&lt;h2&gt;Abusing GitHub is going viral&lt;/h2&gt; 
&lt;p&gt;One of the recent trends ReversingLabs and other security firms have noted is how attackers are expanding their reliance on open source software and open source development infrastructure to further malicious campaigns. That trend includes the growing use of the GitHub version control platform to host elements of malicious command and control infrastructure.&amp;nbsp;&lt;br&gt;&lt;br&gt;For example, two years ago, we wrote about the discovery of a malicious npm package masquerading as the Material Tailwind CSS tool that used GitHub to fetch the address of a malicious command and control (C2) server. Then, in a blog post published in August 2023, the research team at ReversingLabs wrote about &lt;a href="https://www.reversinglabs.com/blog/fake-roblox-api-packages-luna-grabber-npm"&gt;LunaGraber, an open source information-stealing malware available on GitHub&lt;/a&gt;. There was the &lt;span style="font-style: italic;"&gt;IAmReboot&lt;/span&gt; campaign &lt;a href="https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole"&gt;that the ReversingLabs research team wrote about in October&lt;/a&gt;, which described the distribution of malicious NuGet downloaders as well as an obfuscated version of the SeroXen RAT hosted on a GitHub repository. Finally, in December, Karlo Zanki wrote about the discovery of PyPI packages that were &lt;a href="https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise"&gt;using GitHub Gists for hosting two-stage malicious payloads&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;These findings align with those of other security organizations. The threat intelligence firm Recorded Future, for example, recently published a report (PDF&lt;a href="https://go.recordedfuture.com/hubfs/reports/cta-2024-0111.pdf"&gt;&lt;/a&gt;) that &lt;a href="https://go.recordedfuture.com/hubfs/reports/cta-2024-0111.pdf"&gt;found GitHub was the online service that was the most abused by malicious actors&lt;/a&gt;. That abuse includes a range of malicious activity, from payload delivery to command-and-control (C2) and data exfiltration (&lt;a href="https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise"&gt;as ReversingLabs has also observed&lt;/a&gt;). Recorded Future termed this behavior "living-off-trusted-sites" (LOTS), and said it is "expected to grow with [advanced persistent threats (APT)s'] increasing usage and less-sophisticated groups swiftly following suit."&lt;/p&gt; 
&lt;p&gt;Apart from abusing features of platforms like GitHub, there are also concerns that malicious actors might leverage flaws and vulnerabilities in those platforms to further attacks. For example,&amp;nbsp;&lt;a href="https://github.blog/2024-01-16-rotating-credentials-for-github-com-and-new-ghes-patches/"&gt;&lt;span&gt;GitHub recently disclosed &lt;/span&gt;&lt;/a&gt;a serious vulnerability in the GitHub Enterprise Server (GHES) that potentially exposed sensitive credentials. The vulnerability, &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-0200"&gt;&lt;span&gt;CVE-2024-0200&lt;/span&gt;&lt;/a&gt;, was reported to the company as part of its bug bounty program. It does not appear to have been found or exploited previously. However, &lt;a href="https://www.scmagazine.com/news/github-rotates-keys-after-report-of-high-severity-bug-in-a-production-container" style="font-style: italic;"&gt;&lt;span&gt;SC Magazine&lt;/span&gt;&lt;/a&gt; &lt;a href="https://www.scmagazine.com/news/github-rotates-keys-after-report-of-high-severity-bug-in-a-production-container"&gt;reported&lt;/a&gt; that the company said it rotates credentials any time they are exposed to a third party&lt;a href="https://www.scmagazine.com/news/github-rotates-keys-after-report-of-high-severity-bug-in-a-production-container" style="font-style: italic;"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt; 
&lt;h2&gt;Conclusion&lt;/h2&gt; 
&lt;p&gt;Fortunately, these malicious packages were detected and reported to npm administrators before they could be widely distributed. That being said, the &lt;em&gt;warbeast2000&lt;/em&gt; and &lt;em&gt;kodiak2k&lt;/em&gt; packages are more evidence that legitimate platforms such as GitHub are being used to support supply chain attacks.&amp;nbsp;&lt;br&gt;&lt;br&gt;That is a concern. With more and more open source malware available, GitHub is increasingly being used by malicious actors to support their campaigns. Often, these open source malware packages are feature rich and come with very detailed documentation allowing even low-skilled hackers (“script kiddies”) to deploy them.&lt;br&gt;&lt;br&gt;These latest npm campaigns show how malicious actors are starting to use the GitHub platform in novel ways. In addition to GitHub Gists and commit messages being used as C2 infrastructure, we now see GitHub used as a place to store stolen information.&lt;br&gt;&lt;br&gt;As malicious actors continue to develop new techniques for writing malware, developers as well as security researchers need to be on guard for new threats lurking in public repositories. Before including software or a library found on package managers like npm or PyPI, developers and development organizations should conduct a security assessment of those packages to determine if they are safe to use.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Indicators of Compromise (IOCs)&lt;/h2&gt; 
&lt;p&gt;Indicators of Compromise (IoCs) refer to forensic artifacts or evidence related to a security breach or unauthorized activity on a computer network or system. IOCs play a crucial role in cybersecurity investigations and cyber incident response efforts, helping analysts and cybersecurity professionals identify and detect potential security incidents.&lt;br&gt;&lt;br&gt;The following IOCs were collected as part of ReversingLabs investigation of this software supply chain campaign.&lt;/p&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; background-color: #171d38; border-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;package_name&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; background-color: #171d38; border-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;version&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; background-color: #171d38; border-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;SHA1&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.8&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;2da32a4c9e2c3f345f46c6e06d6eb41e13da13d9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.7&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;ad888d4e2b05bee35acf61c3cc053ecdc5e6ffaf&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.6&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;31abb6e4399138b33545ab5dfa3e12fe1ad4d16e&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.5&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;d4a94f63a25891377334909cd544656b16c2b198&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.3&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;ba5c8b0b76b798dea60110a296ba842702aacfa5&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.2&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;d94e7e9f1965c248e17a6629c68f55ffa810e5d5&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.1&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;f1317027456e02fa5c6cadaf897244fc28c24e31&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;warbeast2000&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.0&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;663d74c7b76e5aae72ed45b3680fa3efbd17586d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.42&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;909927bd61f3466d777bbbff38fd844ed8f5c134&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.40&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;c6693fa7d0272562dd56ce8b44c0e99dd1210e43&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.39&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;e762e1456a89218661f97e3ae356c07d35c298e8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.37&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;24e376fbbb4c76b6b3c2572efeaa68053fa35202&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.35&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;7333b0ec183d34a104fd7b9a5f5b93541d39fed3&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.34&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;8f1311588eae8e2fb4eff6dad523198d49d4a766&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.31&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;5500ca40b5537f5b6782a143e8e2e9028b92de2d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.30&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;c6c77b4385978ab9cc1cab0826e75227d612b62a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.29&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;9ccc6f5756bb99c5a4eea9e6abc84b79cb3ae6bd&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.28&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;8f1d36b074f2f6b7bc28718f88849a6aeb9dbbc6&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.25&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;717fa522c6ee505002bf17d3e79385544834461e&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.24&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;245f07892c85807e99a3d9da49677bbd6013ff4f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.22&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;5117a318483b62cd40298358618e57350cc4158a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.21&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;7165b6329ae524392812c534f9bb7e225e305ffe&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.20&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;f6fda33768f859bc0b42bae40ac0c7dafa0f8d93&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.19&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;e70476edc973548abba035993638c1bf3b829d54&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.18&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;c1be7a6bd11236d1302fc6c0b206ec70b3b66d25&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.16&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;55f6b8f098ce173f4bfba374fc6da3cd8e0ff435&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.15&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;d80e1abd7efcd1304a3b5ce1f6302d3a7edaaad9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.14&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;13c0ff1347fe631974797aba94d17180ccc8eded&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.13&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;6f819af455a3b25edc1f27c938cbaaffdbf3d910&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.12&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;401b2fcd9359215f2f70f39d7d0aa1d50ab09b43&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.11&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;d0c75071fc20f03d1b6d35ce7240b03c2a79f5c7&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.10&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;ed6e04e810ff085a1a208788e47cce9352ab58bf&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.9&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;1d5da7f3fbea3d3915bddeb4c223ba147667a6ba&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.8&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;fa562e9f3374055812c463b8e36c113a2aafa61c&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.7&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;3198a29d70628d1b9feaf8f7215c667383007f48&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.6&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;94836b8471a22563c91d35df6f3a1f5b8e028aa7&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.5&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;79c4359c0c21c4a6c43062a6e9e894ca0bd5617a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.4&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;562238aff7746bdc60f891670c0c8bff46cebe02&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.3&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;96b336c4fddbd1d91a9d1eacb4c36441880ac5bf&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.2&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;445922433303e38e227121046d38dd3f31a1d6e0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.1&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;30fb4cb07089d4e5773e1f20f0a0b25c34aa20ea&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 24.1774%; padding: 4px; border-color: #afc7d7;"&gt;kodiak2k&lt;/td&gt; 
    &lt;td style="width: 17.2036%; padding: 4px; border-color: #afc7d7;"&gt;1.0.0&lt;/td&gt; 
    &lt;td style="width: 58.619%; padding: 4px; border-color: #afc7d7;"&gt;9300a1ff6bc49aa3f0bfe46245a470f14fc7fac3&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;h3&gt;Second stage payloads:&lt;/h3&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 100%; padding: 4px; background-color: #171d38; border-color: #171d38;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;SHA1&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 100%; padding: 4px; border-color: #afc7d7;"&gt;dba623bdad6bdb37359e047efcda34de4af5f518&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 100%; padding: 4px; border-color: #afc7d7;"&gt;9526b820a21fa70641361e061b0f99517ab1b184&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fgitgot-cybercriminals-using-github-to-store-stolen-data&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Research</category>
      <pubDate>Tue, 23 Jan 2024 13:00:00 GMT</pubDate>
      <author>lucija.valentic@reversinglabs.com (Lucija Valentić)</author>
      <guid>https://www.reversinglabs.com/blog/gitgot-cybercriminals-using-github-to-store-stolen-data</guid>
      <dc:date>2024-01-23T13:00:00Z</dc:date>
    </item>
    <item>
      <title>GitHub Actions hack bolsters case for complex binary analysis</title>
      <link>https://www.reversinglabs.com/blog/github-actions-hack-bolsters-case-for-complex-binary-analysis</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/github-actions-hack-bolsters-case-for-complex-binary-analysis" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/appsec-evolve-github-actions-runners.jpg" alt="GitHub Actions hack bolsters case for complex binary analysis" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/appsec-evolve-github-actions-runners.jpg?width=1400&amp;amp;height=732&amp;amp;name=appsec-evolve-github-actions-runners.jpg" width="1400" height="732" alt="appsec-evolve-github-actions-runners" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;A novel attack method on GitHub illustrates yet again why application security (AppSec) teams should be implementing in-depth security measures — &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;beyond what legacy application security testing tools can provide&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;The attack, discovered by Praetorian security researcher &lt;a href="https://www.linkedin.com/in/adnanekhan/"&gt;Adnan Khan&lt;/a&gt;, involves GitHub-hosted runners, which are virtual&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;machines that execute jobs in a GitHub Actions workflow. There are two kinds of runners in GitHub Actions, which is one of the biggest continuous integration/continuous delivery (CI/CD) services in the market, largely because it's free for public repositories.&lt;/p&gt; 
&lt;p&gt;Hosted runners are maintained by GitHub for Windows, OS X, and Linux. There are also self-hosted runners, which are build agents hosted by users. Since they're hosted by users, they're also secured by users, which is why GitHub advises against using self-hosted runners on public repositories.&lt;/p&gt; 
&lt;p&gt;Khan described in a deep-dive blog post &lt;a href="https://adnanthekhan.com/2023/12/20/one-supply-chain-attack-to-rule-them-all/"&gt;how he discovered a critical misconfiguration vulnerability that provided access to GitHub's internal infrastructure&lt;/a&gt;, as well as secrets — and how that access could have been used to inject malicious code into all of GitHub's runner base images, allowing an attacker to conduct a supply chain attack against every GitHub customer that used hosted runners.&lt;/p&gt; 
&lt;p&gt;Here are the key takeaways from the threat research — and why you need to evolve your AppSec approach with &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;complex binary analysis and reproducible builds&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;[ Get the new report:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/sscs-report" style="font-weight: bold;"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;| Join the conversation:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024" style="font-weight: bold;"&gt;Webinar: State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024" style="font-weight: bold;"&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;How attackers could leverage runners for mischief&lt;/h2&gt; 
&lt;p&gt;By default, when a self-hosted runner is attached to a repository, any workflow running in that repository’s context can use that runner. As long as the runs-on field is set to self-hosted, the runner will pick up the workflow and start processing it, Khan said.&lt;/p&gt; 
&lt;p&gt;For workflows that are on default settings and that feature branches, this isn’t an issue, he continued. Users must have write access to update branches within repositories. The problem is that this also applies to workflows from fork-pull requests.&lt;/p&gt; 
&lt;p&gt;By changing a workflow file within their fork and then creating a pull request, anyone with a GitHub account can run arbitrary code on a self-hosted runner.&lt;/p&gt; 
&lt;p&gt;There is one roadblock, but not a very formidable one: GitHub requires a user to be a previous contributor to a repository before their workflows from pull request forks will run without approval. Becoming a contributor, however, is as simple as correcting a typo or making a small code change.&lt;/p&gt; 
&lt;p&gt;Acceptance of contributors to these repositories may be too lax, but any criticism here must be tempered by reality.&lt;span&gt; &lt;/span&gt;A lot of these projects aren't maintained by a lot of people. There's usually a small number of key individuals spearheading the project. They're trying to do things in the right way, but there are bad guys out there seeking to exploit capabilities that are intended for good.&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;An unforeseen attack vector?&lt;/h2&gt; 
&lt;p&gt;One other condition must be met before an attacker can work their mischief. The self-hosted runner must be non-ephemeral, which means that it is possible to start a process in the background that will continue to run after the job is completed. By default, self-hosted runners are configured to be non-ephemeral.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Once the runner-images repository was set to the default approval setting, had a non-ephemeral self-hosted runner, and the attacker’ had a contributor’s account, they had everything necessary to conduct a public &lt;a href="https://medium.com/cider-sec/ppe-poisoned-pipeline-execution-34f4e8d0d4e9"&gt;Poisoned Pipeline Execution&lt;/a&gt; attack against the runner-images repository’s CI/CD workflows, Khan wrote.&lt;/p&gt; 
&lt;p&gt;According to a &lt;span style="font-style: italic;"&gt;SecurityWeek &lt;/span&gt;report&lt;a href="https://www.securityweek.com/major-it-crypto-firms-exposed-to-supply-chain-compromise-via-new-class-of-ci-cd-attack/" style="font-style: normal;"&gt;&lt;/a&gt;&lt;span style="font-style: italic;"&gt;,&lt;/span&gt; the researchers &lt;a href="https://www.securityweek.com/major-it-crypto-firms-exposed-to-supply-chain-compromise-via-new-class-of-ci-cd-attack/"&gt;limited their investigation to repositories belonging to organizations that would pay out high rewards&lt;/a&gt; through their bug bounty programs, and have submitted over 20 bug bounty reports, raking in hundreds of thousands of dollars in bounties.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;If you're having trouble fixing the flaws that you know about, how are you going to protect against the unknowns? If you don't know what to look for, you won't find it.&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;This discovery shows how software supply chain attacks are constantly changing. People using these runners never thought they could be used in this way. The organizations that paid the bug bounties after being told about the risk had no idea they were vulnerable. If you're having trouble fixing the flaws that you know about, how are you going to protect against the unkowns? If you don't know what to look for, you won't find it.&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;Software complexity demands better AppSec tooling&lt;/h2&gt; 
&lt;p&gt;Developing software these days is very complex. There are many moving parts — first-party code, open-source code, and third-party code — and it's hard to think of every potential lever and dial that needs to be appropriately configured. That's why, in addition to traditional application security testing, before the software is released, you need a sort of final exam for the complete software packages, to comprehensively vet and compare complete software packages.&lt;/p&gt; 
&lt;p&gt;This compromise of GitHub Actions illustrates why organizations need defense in depth. You can't just look at one or two things and feel secure. You have to look at everything. That's why software versions need to be compared to one another. You can't just look at the pieces of the puzzle because, even if the pieces fit together, the final picture may not look like what's on the cover of the box. Only by comparing one version or one build to another can you see what's changed and if those changes are acceptable and correct. That kind of differential analysis is needed to discover the fingerprints of tampering, compromise, or the insertion of malware.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;[Differential analysis] is needed to discover the fingerprints of tampering, compromise, or the insertion of malware.&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Evolve your AppSec approach&lt;/h2&gt; 
&lt;p&gt;There's no such thing as a 100% secure software application. You never know when something is going to be manipulated in a way you never thought about. There are always risks that are either unknown or being addressed. &lt;br&gt;&lt;br&gt;Security teams try to do the best they can with what they have. &lt;a href="https://www.reversinglabs.com/blog/the-evolution-of-appsec-5-key-changes-required-for-a-new-era"&gt;AppSec tools have evolved&lt;/a&gt; — from &lt;a href="https://www.reversinglabs.com/glossary/static-application-security-testing-sast"&gt;SAST&lt;/a&gt;, to &lt;a href="https://www.reversinglabs.com/glossary/dynamic-application-security-testing-dast"&gt;DAST&lt;/a&gt;,&amp;nbsp; and then &lt;a href="https://www.reversinglabs.com/glossary/software-composition-analysis"&gt;software composition analysis (SCA)&lt;/a&gt;. With the pace and complexity of modern software development, AppSec tools that allow defense in depth to be done at many stages of the process, including the final stage — post-compilation, pre-deployment — are now a requirement.&amp;nbsp;&lt;br&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;br&gt;&lt;span&gt;The Enduring Security Framework, a public-private working group led by the National Security Agency (NSA) and the&amp;nbsp;&lt;/span&gt;&lt;span&gt;Cybersecurity and Infrastructure Security Agency (CISA)&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; recently stepped up its software supply chain security guidance with a&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds" style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;call to for binary analysis and reproducible builds to manage risk.&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;Complex binary analysis,&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;which focuses on malware, can help organizations evaluate and verify the security of not just internally developed software, but also third-party commercial software in their environment, providing that much-needed final exam.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fgithub-actions-hack-bolsters-case-for-complex-binary-analysis&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Wed, 17 Jan 2024 12:30:00 GMT</pubDate>
      <author>matthew.rose@reversinglabs.com (Matt Rose)</author>
      <guid>https://www.reversinglabs.com/blog/github-actions-hack-bolsters-case-for-complex-binary-analysis</guid>
      <dc:date>2024-01-17T12:30:00Z</dc:date>
    </item>
    <item>
      <title>The State of Software Supply Chain Security 2024: Key takeaways</title>
      <link>https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/SSCS-Report-Blog-image-1400x732.png" alt="The State of Software Supply Chain Security 2024: Key takeaways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;&lt;/a&gt;&lt;br&gt;Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers that you can measure in headlines, which in recent years have delivered news about attacks on popular software tools including MOVEIt, 3CX, and CircleCI.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/SSCS-Report-Blog-image-1400x732.png?width=700&amp;amp;height=366&amp;amp;name=SSCS-Report-Blog-image-1400x732.png" width="700" height="366" alt="SSCS-Report-Blog-image-1400x732" style="height: auto; max-width: 100%; width: 700px;"&gt;&lt;/a&gt;&lt;br&gt;Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers that you can measure in headlines, which in recent years have delivered news about attacks on popular software tools including MOVEIt, 3CX, and CircleCI.&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;What’s behind this change? An explosion in supply chain threats, for one thing. &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;ReversingLabs' State of Software Supply Chain Security 2024 report&lt;/a&gt; finds that incidents of malicious packages found on popular open-source package managers have increased by 1,300% over the past three years. Despite that, however, the software industry at large still hasn’t woken up to the changing landscape of software supply chain security threats. Loose development practices and inattention to software supply chain risks persist, ReversingLabs found.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Infographic---The-State-of-Software-Supply-Chain-Security-2024-1300.png?width=1400&amp;amp;height=732&amp;amp;name=Infographic---The-State-of-Software-Supply-Chain-Security-2024-1300.png" width="1400" height="732" alt="Infographic---The-State-of-Software-Supply-Chain-Security-2024-1300" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;The State of Software Supply Chain Security 2024 is ReversingLabs’ second annual assessment of software supply chain security. The report gives an overview of the 2023 threat landscape, analyzes what has changed since 2022, and anticipates what the industry can expect in 2024.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;In assembling the report, the ReversingLabs research team surveyed the software supply chain threat landscape. They not only observed an increase in the number of malicious incidents, but also saw that the bar for carrying out successful supply chain attacks is lowering, as more and different types of malicious cyber-actors incorporate aspects of supply chain attacks into their playbooks and tooling.&lt;/p&gt; 
&lt;p&gt;Equally concerning: Stakeholders in the software supply chain, such as software developers, application security (AppSec) teams, open-source maintainers, and third-party risk managers are &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;struggling to address the gaps in their software supply chain security&lt;/a&gt;, making it less likely that they will successfully mitigate threats.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Here are the important takeaways from the State of Software Supply Chain Security 2024 report.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Get the new report: &lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt; | See the Webinar: &lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;Software producers and consumers have a blind spot&lt;/h2&gt; 
&lt;p&gt;In 2023, examples continued to pop up of threat actors going beyond the exploitation of vulnerabilities to carry out software supply chain attacks. In March 2023, for example, voice over IP (VoIP) vendor 3CX disclosed that a version of the company’s 3CX Desktop App software was distributed with malicious code to thousands of customers.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.reversinglabs.com/blog/red-flags-fly-over-supply-chain-compromised-3cx-update"&gt;&lt;span&gt;ReversingLabs’ analysis of the incident&lt;/span&gt;&lt;/a&gt; found that attackers managed to compromise 3CX’s software build pipeline, making modifications to 3CX’s copies of standard open-source files to insert malicious code into the finished 3CX Desktop App package. While there were signs of tampering, &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;3CX unfortunately failed to detect the evidence of it&lt;/a&gt; before it released the software to its customers — and long afterwards as well.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The case of 3CX Desktop App showcases the blind spot that software producers have in the security measures they use to ensure that software releases are secure post-deployment. It also demonstrates how consumers are subject to such third-party malicious threats if they don’t use proper tooling to vet their third-party software providers. Software-producing and -consuming organizations need to choose tools that go beyond detecting vulnerabilities to avoid this security blind spot.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;That’s why, in addition to using legacy AppSec tools such as software composition analysis (SCA) and static and dynamic application security testing (SAST and DAST), stakeholders of software supply chains should also opt in to &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;tooling that analyzes raw code and tracks the evolution of compiled software binaries&lt;/a&gt;. This technology will help organizations identify unwanted or unknown changes made to a software package, &lt;a href="https://www.reversinglabs.com/blog/tampering-lurks-below-the-surface-key-problems-with-software-integrity-validation"&gt;such as malicious tampering&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;A lower bar for software supply chain attacks&lt;/h2&gt; 
&lt;p&gt;Software supply chain attacks used to be an exclusive realm for sophisticated, nation state-backed hacking crews. This is changing. Based on data compiled from ReversingLabs, the bar for software supply chain attacks dropped steadily in 2023, and ReversingLabs experts believe that it will continue to decline in 2024.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;By scouring common open-source repositories, ReversingLabs researchers discovered a number of open-source software supply chain attacks in 2023 that were delivering malware such as &lt;a href="https://www.reversinglabs.com/blog/rats-found-hiding-in-the-npm-attic"&gt;&lt;span&gt;infostealers&lt;/span&gt;&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk"&gt;&lt;span&gt;backdoors&lt;/span&gt;&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza"&gt;&lt;span&gt;protestware&lt;/span&gt;&lt;/a&gt;, and more.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;There are a number of reasons for this. First, open-source software repositories, such as npm, Python Package Index (PyPI), and NuGet are growing as attack surfaces. In 2023, ReversingLabs saw a 28% increase from the year before in the total number of malicious packages uploaded to open-source repositories. Those malicious packages are easy to place and open the door to techniques such as typosquatting, repojacking, and other tricks that play on the goodwill (or haste) of developers who rely on open source code and package managers.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/state-of-sscs-2024-28.png?width=1400&amp;amp;height=732&amp;amp;name=state-of-sscs-2024-28.png" width="1400" height="732" alt="state-of-sscs-2024-28" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;The other reason that the barrier to carrying out a software supply chain attack is dropping is that cyber-criminals are embracing supply chain attacks to enhance common, low-level campaigns such as phishing attacks. For example, &lt;a href="https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks"&gt;&lt;span&gt;Operation Brainleeches&lt;/span&gt;&lt;/a&gt;, discovered by ReversingLabs researchers in July 2023, displayed what may be the first “dual-use” campaign via npm, in which over a dozen malicious packages uploaded to the widely used repository were used to fuel phishing campaigns that targeted Microsoft 365 end users in addition to npm developers — the more typical target of malicious campaigns on these platforms.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The case of Operation Brainleeches targeting two different kinds of victims, as well as the increase in open-source software supply chain attacks this year, showcases how these incidents are becoming easier to pull off and more difficult for security teams to manage.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Big changes, but more of the same, too&lt;/h2&gt; 
&lt;p&gt;While there have been substantial changes in the threat landscape this past year, the goals and tactics of threat actors stayed fairly consistent compared to what was seen in the past.&lt;/p&gt; 
&lt;p&gt;As noted before, ReversingLabs' new report cites a 28% increase in the number of malicious packages across open-source repositories. That &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security"&gt;increase is on track with earlier years&lt;/a&gt;. However, when breaking down the numbers by each repository, ReversingLabs researchers noted some interesting changes. For instance, there was a 400% increase in the number of packages residing on the PyPI open-source repository in comparison to 2022, yet 2023 saw a 43% decrease in the number of malicious packages on npm, despite it being the primary repository used for the dissemination of malicious packages the previous year.&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/state-of-sscs-2024-400.png?width=1400&amp;amp;height=732&amp;amp;name=state-of-sscs-2024-400.png" width="1400" height="732" alt="state-of-sscs-2024-400" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;The significance of these changes between npm and PyPI is not clear. It may be due to the growing popularity of PyPI among the developer community. With the increased use of the Python programming language and the PyPI platform, threat actors are seeing it as the more worthy target for malicious packages. Or it may be a momentary fluctuation in malicious supply chain activity that will not be sustained.&lt;/p&gt; 
&lt;p&gt;Despite the variability of threat trends, one trend line that continued its journey upward was the amount of software secrets lurking on open-source platforms. ReversingLabs found more than 40,000 secrets spread across four major open-source repositories: npm, PyPI, RubyGems, and NuGet. The total amount found is unsurprising, given how secrets leaks have emerged in recent years as a consistent software supply chain weakness — one rooted in loose application design and modern-day development practices.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/state-of-sscs-2024-secrets.png?width=1400&amp;amp;height=732&amp;amp;name=state-of-sscs-2024-secrets.png" width="1400" height="732" alt="state-of-sscs-2024-secrets" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Typically, secrets are attributable to a number of sources, such as API keys, security tokens, credentials, and more that provide access to resources such as Google, GitHub, and AWS. That was the case again this year, with one notable addition to the list of top sources of leaked secrets: OpenAI, the artificial intelligence start-up behind ChatGPT. OpenAI alone accounted for 19% of all leaked secrets on the PyPI platform in 2023, as well as 18% on the RubyGEMS platform, ReversingLabs researchers discovered. Leaked OpenAI API tokens accounted for almost all of that, reflecting the growing use and popularity of OpenAI’s ChatGPT AI chatbot. As with the &lt;a href="https://www.theregister.com/2023/12/04/exposed_hugging_face_api_tokens/"&gt;&lt;span&gt;discovery of more than 1,500 leaked API tokens&lt;/span&gt;&lt;/a&gt; on the Hugging Face machine-learning platform, the leaks of OpenAI’s API tokens could expose sensitive files, images, and AI models for organizations with leaked tokens, according to ReversingLabs.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/state-of-sscs-2024-openai.png?width=1400&amp;amp;height=732&amp;amp;name=state-of-sscs-2024-openai.png" width="1400" height="732" alt="state-of-sscs-2024-openai" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;These changes and consistencies in the threat landscape underscore the need to continue taking software supply chain security seriously — in particular, open-source threats and secrets leaks. And while the number of threats changed this past year, the fundamentals of what needs to be protected has largely stayed the same since 2022.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Read the full report to learn more&lt;/h2&gt; 
&lt;p&gt;Many of the trends identified in 2023 are likely to continue or deepen in 2024 as policymakers wrestle with the fallout of attacks such as the Clop gang’s campaign against users of Progressive Software’s MOVEIt secure file transfer application and contemplate ways to hold private-sector software producers accountable. That, along with growing scrutiny by both governments and industry regulators, means that software publishers are under growing pressure to devote resources and time to shoring up the security of their development organizations.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;ReversingLabs' new report explores that trend for 2024, as well as others, including:&amp;nbsp;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Changes in the cyber-underground&lt;/li&gt; 
 &lt;li&gt;A higher regulatory bar for incident disclosure and software supply chain security efforts&amp;nbsp;&lt;/li&gt; 
 &lt;li&gt;The evolution of federal government guidance on software supply chain security&lt;/li&gt; 
&lt;/ul&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fthe-state-of-software-supply-chain-security-2024-key-takeaways&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 16 Jan 2024 15:55:54 GMT</pubDate>
      <author>carolynn.vanarsdale@reversinglabs.com (Carolynn van Arsdale)</author>
      <guid>https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways</guid>
      <dc:date>2024-01-16T15:55:54Z</dc:date>
    </item>
    <item>
      <title>A (partial) history of software supply chain attacks</title>
      <link>https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/A-Partial-History-of-Software-Supply-Chain-Attacks-2023.jpg" alt="A (Partial) History of Software Supply Chain Attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The widespread campaign of &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;software supply chain hacks that were behind the attack on SolarWinds began in 2020&lt;/a&gt;, and unofficially elevated software supply chain security to the top echelon of cyber risks to both government and the private sector. Subsequent events, like the emergence of the &lt;a href="https://www.reversinglabs.com/blog/log4j-is-why-you-need-an-sbom."&gt;Log4Shell vulnerability&lt;/a&gt; in the Log4j2 open source library, underscored that &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;software supply chain risk is for real&lt;/a&gt;.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/A-Partial-History-of-Software-Supply-Chain-Attacks-2023.jpg?width=1400&amp;amp;height=732&amp;amp;name=A-Partial-History-of-Software-Supply-Chain-Attacks-2023.jpg" width="1400" height="732" alt="A (Partial) History of Software Supply Chain Attacks" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;The widespread campaign of &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;software supply chain hacks that were behind the attack on SolarWinds began in 2020&lt;/a&gt;, and unofficially elevated software supply chain security to the top echelon of cyber risks to both government and the private sector. Subsequent events, like the emergence of the &lt;a href="https://www.reversinglabs.com/blog/log4j-is-why-you-need-an-sbom."&gt;Log4Shell vulnerability&lt;/a&gt; in the Log4j2 open source library, underscored that &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;software supply chain risk is for real&lt;/a&gt;.&lt;br&gt;&lt;span style="background-color: transparent;"&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="background-color: transparent;"&gt;&lt;/span&gt;&lt;span style="background-color: transparent;"&gt;However, if you are thinking that supply chain threats and attacks as a new problem plaguing software producers and their customers, you are wrong. In fact, software supply chain attacks have been with us for years — decades even — though they haven’t always demanded the &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report"&gt;kind of attention and response they now receive&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Below is a list of known software supply chain attacks, compiled from public records and reporting. This list is — of course — incomplete. First: it is likely that there have been supply chain attacks in which the details have not been made public. Second, these attacks are happening all the time, making any accounting of software supply chain attacks incomplete. Finally, opinions on what constitutes a software supply chain attack can differ from expert to expert.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Get the new report:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;&amp;nbsp;| Join the conversation:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;Webinar: State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2&gt;A chronology of software supply chain attacks&lt;/h2&gt; 
&lt;p&gt;Below is a list of known (documented, reported) attacks involving compromises of software supply chains (from latest to oldest).&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fa-partial-history-of-software-supply-chain-attacks&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>RSA Conference 2022</category>
      <pubDate>Tue, 16 Jan 2024 15:30:00 GMT</pubDate>
      <author>paul.roberts@reversinglabs.com (Paul Roberts)</author>
      <guid>https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks</guid>
      <dc:date>2024-01-16T15:30:00Z</dc:date>
    </item>
    <item>
      <title>The evolution of AppSec: 4 key changes required for a new era</title>
      <link>https://www.reversinglabs.com/blog/the-evolution-of-appsec-5-key-changes-required-for-a-new-era</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/the-evolution-of-appsec-5-key-changes-required-for-a-new-era" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/evolution-of-appsec-2024-next-steps.jpg" alt="The evolution of AppSec: 4 key changes required for a new era" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #323338; background-color: white;"&gt;&lt;br&gt;Software development continues to swiftly advance and also to entail more complex dependencies, with &lt;span style="color: #323338; background-color: white;"&gt;continuous integration/continuous development (CI/CD) bringing &lt;/span&gt;faster code releases. Meanwhile, application security (AppSec) is struggling to keep up with its &lt;span style="color: #323338; background-color: white;"&gt;practices and tooling&lt;/span&gt;.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;span style="color: #323338; background-color: white;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/evolution-of-appsec-2024-next-steps.jpg?width=1400&amp;amp;height=732&amp;amp;name=evolution-of-appsec-2024-next-steps.jpg" width="1400" height="732" alt="evolution-of-appsec-2024-next-steps" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;Software development continues to swiftly advance and also to entail more complex dependencies, with &lt;span style="color: #323338; background-color: white;"&gt;continuous integration/continuous development (CI/CD) bringing &lt;/span&gt;faster code releases. Meanwhile, application security (AppSec) is struggling to keep up with its &lt;span style="color: #323338; background-color: white;"&gt;practices and tooling&lt;/span&gt;.&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;Ahead of both development and AppSec, however, are attackers, who have adjusted to the changes in development patterns. Both the scale of attacks afforded &lt;span style="color: #323338; background-color: white;"&gt;attackers&lt;/span&gt; by cloud-native development and the interconnected reusability of components in the modern software supply chain have been a boon for them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;Attacks such as &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;Sunburst, which was behind the SolarWinds compromise&lt;/a&gt;, and last year's &lt;a href="https://www.reversinglabs.com/blog/moveit-supply-chain-bug-exploited-for-two-years"&gt;MOVEIt&lt;/a&gt; attest to how easy it has become for &lt;span style="color: #323338; background-color: white;"&gt;attackers&lt;/span&gt; to cut through tens of thousands of targets at once with a precise blow against a weak link in the software supply chain.&lt;/span&gt;&lt;span style="color: #323338; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;Even though AppSec has evolved in recent years, it's not changing fast enough. Today's software development practices and tool chain remain woefully unprotected from attacks, and &lt;a href="https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security"&gt;legacy AppSec tools and practices are failing&lt;/a&gt; the teams charged with securing their releases or managing risk in their organizations&lt;a href="https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security"&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;In 2024, AppSec must make a giant leap forward to modern practices and tooling in order to tackle the new era of software supply chain attacks. Here are the four essential changes needed.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;[ Get the new report:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;&lt;span&gt;&amp;nbsp;| Join the conversation:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;Webinar: State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;&lt;/a&gt;&lt;span&gt;&amp;nbsp;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="background-color: white;"&gt;A brief history of AppSec&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;For the better part of 20 years, the world of AppSec has been locked into an evolutionary game of innovation leapfrog. Every time a new iteration of application scanning or testing comes along, the development world changes. Waterfall shifted to agile, agile morphed into DevOps, and DevOps refined itself with cloud-native principles and rampant reuse of components through microservices. And throughout it all, new programming languages kept growing in popularity, further adding complexity to the task of examining code, configurations, and overall security of applications.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;Attackers adjusted quickly, picking apart new weaknesses and coming up with stealthier attack methods against the software ecosystem, while keeping most of their old attack methods in play for as long as they could. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;That means AppSec pros must leap into new tooling while carrying all the old tooling and practices. The industry started with generic web application scanners such as those from &lt;a href="https://en.wikipedia.org/wiki/HP_Application_Security_Center"&gt;SPI Dynamics&lt;/a&gt;, and those later bifurcated into the staple duo of &lt;a href="https://www.reversinglabs.com/glossary/static-application-security-testing-sast"&gt;static application security testing (SAST)&lt;/a&gt; and &lt;a href="https://www.reversinglabs.com/glossary/dynamic-application-security-testing-dast"&gt;dynamic application security testing (DAST)&lt;/a&gt;. &lt;/span&gt;&lt;span style="color: #323338; background-color: white;"&gt;From there &lt;a href="https://www.reversinglabs.com/glossary/interactive-application-security-testing-iast"&gt;interactive application security testing (IAST)&lt;/a&gt; came to fill in the gaps left by SAST/DAST, and layered on top came &lt;a href="https://www.reversinglabs.com/blog/the-software-composition-analysis-tools-landscape-and-software-supply-chain-security"&gt;software composition analysis (SCA)&lt;/a&gt;. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;In short, AppSec has to&lt;span style="color: black;"&gt; manage a mashup of legacy tools. "This has created so much tool sprawl in the industry," said M&lt;/span&gt;&lt;span style="color: black;"&gt;att Rose, field CISO for ReversingLabs.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"In the AppSec testing market, all the solutions that are out there are always chasing the changes in the way software is being developed. And if you're in the industry long enough, you see that one of the biggest things that drives any AppSec tooling — whether SAST, DAST, or IAST — is, 'What languages can it scan?'"&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/mattarose/" style="font-style: italic;"&gt;Matt Rose&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;span style="background-color: white;"&gt;A call to action on AppSec tooling and practices&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;This overload for AppSec teams has led many involved in the industry to call for systemic changes. On the government side, the U.S. &lt;span&gt;Cybersecurity and Infrastructure Security Agency (CISA)&lt;/span&gt; l&lt;span style="color: #323338; background-color: white;"&gt;ast year &lt;/span&gt;introduced &lt;a href="https://www.reversinglabs.com/blog/cisas-security-by-design-for-software-its-a-starting-point-not-an-endpoint"&gt;Secure by Design&lt;/a&gt; and the &lt;a href="https://www.reversinglabs.com/blog/nist-csf-2.0-whats-in-this-major-revision-and-why-its-much-improved"&gt;Cybersecurity Framework 2.0,&lt;/a&gt; with a focus on software supply chain security. &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report?hs_preview=sQkPlSBB-150592128908"&gt;The analyst firm Gartner is also on board&lt;/a&gt;&lt;span style="color: #323338; background-color: white;"&gt;, with its latest guidance pushing for software supply chain security and third-party risk management to be better merged within the greater cybersecurity strategic framework. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;In order to support these changes, organizations need new tooling. &lt;/span&gt;&lt;span style="color: #323338; background-color: white;"&gt;Companies require comprehensive software supply chain security, including &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;complex binary analysis. &lt;/a&gt;However,&lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt; &lt;/a&gt;&lt;/span&gt;&lt;span style="color: black;"&gt;Rose said that while tools that provide comprehensive software supply chain security are essential, companies cannot get rid of their legacy tools overnight.&amp;nbsp;&lt;/span&gt;&lt;span style="color: #323338; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"People are struggling with just reams of data, and they're releasing software faster and faster and faster. So it's like every time you do a scan, if you integrate it into your build, you just have more information than you can process. So now you know your house is on fire, but you don't know which room it is. It's like all the rooms are on fire at once. There are alarms going off everywhere."&lt;br&gt;—Matt Rose&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;With companies facing increasing risk for software supply chain attacks, you need to evolve your AppSec approach so that it can keep up with software engineering — and attacker adaptations. &lt;/span&gt;&lt;span style="color: #323338; background-color: white;"&gt;Here are four things that experts say need to happen.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #323338; background-color: white;"&gt;1. Software supply chain security demands transparency&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;As organizations move to building and using software bills of materials (SBOM) more thoroughly, the industry is going to have to decide how to make SBOMs truly comprehensive. Currently, gaining transparency into the open-source dependency chain has received hyperfocus, at the expense of the bigger problem: the composition and dependencies within commercial software. This was one of the big points made in the &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/gartner-report-mitigate-enterprise-software-supply-chain-security-risks"&gt;Gartner report, &lt;span style="color: black;"&gt;sai&lt;/span&gt;&lt;/a&gt;&lt;span style="color: black;"&gt;d &lt;/span&gt;Saša Zdjelar, chief trust officer at ReversingLabs and a former chief information security officer at ExxonMobil.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"As an industry, we're struggling with the definition of 'comprehensive.' In my world, comprehensive means 'everything, with no excuses.' &lt;/span&gt;&lt;span style="color: black;"&gt;But a lot of companies who say, 'We do SBOM,' define 'comprehensive' as, 'As long as it's only open source, and as long as it's only one of these seven file types, and as long as it's less than 65 megs size, then we're comprehensive.'"&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/sasazdjelar/"&gt;Saša Zdjelar&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;span style="color: black; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;Zdjelar said that comprehensive transparency of dependencies is essential if organizations are going to truly address their AppSec risk across the supply chain and use SBOMs to remediate or at least mitigate risk preemptively and to effectively respond to incidents.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #323338; background-color: white;"&gt;2. AppSec pros must conduct practices like a symphony&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;The evolution of AppSec tooling thus far means that practitioners are going to have to become a lot better at integration, tools orchestration, and delegation, said Rose.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"Successful AppSec people think of their roles as like being the conductor of a symphony. I think the most effective way to do it is doing identification at the CI orchestration layer and then remediation based on the expertise layer."&lt;br&gt;—Matt Rose&lt;/span&gt;&lt;/em&gt;&lt;span style="color: black; font-size: 11px; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #323338; background-color: white;"&gt;3. Prioritized action and automation are key&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;All of that delegation and orchestration of identification and remediation can't be done manually, and it can't be done all at once — in fact, some of it may be of a low enough priority to not be done at all. And prioritization will be key in 2024, with an emphasis on elevating how tooling can signal prioritized action and on improving automation so that priorities are met. The goal is making AppSec more efficient without losing the insights from the tools it has added over the years.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;John Funge, managing director of the security venture capital firm DataTribe, said that in the age of supply chain attacks, AppSec &lt;a href="https://www.reversinglabs.com/blog/why-shift-left-is-now-a-dirty-word-in-some-security-circles"&gt;must go beyond "shift left."&lt;/a&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"There is a growing movement behind the idea that digital products need to be built more securely in the first place, that is, Secure by Design. It’s more than 'shifting left.' Rather, it’s a realization that the entire software development lifecycle needs to be reoriented to elevate security to the same level as user experience, performance, and reliability in the minds of product development teams."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/johnfunge/"&gt;John Funge&lt;/a&gt;&lt;/em&gt;&lt;span style="color: #212121; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;Funge said that the company founders he's been working with are seeing opportunities to build up capabilities that make things easier for security teams and the developers they work with.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="color: #212121;"&gt;&lt;em&gt;"We are seeing an increased emphasis on helping teams to identify not just vulnerabilities in libraries they use, but also how impactful each particular vulnerability will be depending on the context of how that specific system uses the library. There is a movement afoot to fuse static and dynamic application testing principles to deliver better results and greater efficiency."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—John Funge&lt;/em&gt;&lt;span style="color: #212121; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;Rose said integration and automation will be crucial to dealing with AppSec, given the speed of DevOps pipelines today.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"People are releasing sometimes thousands of times a day with microservices architecture. It has to be automated. If it's manual and it takes a day to do something, ... you're already behind."&lt;br&gt;—Matt Rose&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;4. Software packages need a final exam&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;AppSec threat mitigation is &lt;a href="https://www.reversinglabs.com/blog/zoom-joins-the-vulnerability-fray-will-it-move-the-needle-on-appsec"&gt;no longer primarily about finding and fixing vulnerabilities&lt;/a&gt;. It's more about catching &lt;a href="https://www.reversinglabs.com/blog/why-your-appsec-teams-focus-should-shift-to-malware"&gt;malware that has sneaked its way into the software supply chain&lt;/a&gt;. &lt;span style="color: #323338; background-color: white;"&gt;Henrik Plate, security researcher for Endor Labs, said to e&lt;/span&gt;xpect to see a whole lot more of that in 2024.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"In the past few years, registries like PyPI, npm, or Rubygems.org were the primary focus of attackers, but the deployment of malicious packages using techniques like typosquatting has already extended to other component registries or marketplaces, and this trend will continue. Attackers will refine obfuscation and evasion techniques and continue to conduct bigger malware campaigns, with hundreds or thousands of malicious software packages deployed in short time frames, because running such campaigns is relatively cheap."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/henrikplate/"&gt;Henrik Plate&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #323338; background-color: white;"&gt;One of the reasons attackers are finding it easy to slip malicious packages into software is that organizations have been so focused on shifting left — doing their testing early in the release cycle — that they're forgetting that checks need to happen before software releases, Rose said.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"We have to be diligent and shift security everywhere. We especially need a 'final exam' to check for potential risk or compromise before each release."&lt;br&gt;—Matt Rose&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: black;"&gt;These last checks need to be built into the development workflow to look for malware injections, tampering and other problems like secrets leaks or other identity problems.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Comprehensive supply chain security is now a requirement&lt;/h2&gt; 
&lt;p&gt;When it comes to managing risk across the software development lifecycle (SDLC), Rose said modern tooling that can deliver such a final exam is key, citing the Enduring Security Framework group's&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;call to for binary analysis and reproducible builds to manage risk.&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;Complex binary analysis,&lt;/a&gt; which focuses on malware, can help organizations evaluate and verify the security of not just internally developed software, but also third-party commercial software in their environment, before it is released, Rose said.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fthe-evolution-of-appsec-5-key-changes-required-for-a-new-era&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 11 Jan 2024 19:09:39 GMT</pubDate>
      <author>ericka@chickowski.com (Ericka Chickowski)</author>
      <guid>https://www.reversinglabs.com/blog/the-evolution-of-appsec-5-key-changes-required-for-a-new-era</guid>
      <dc:date>2024-01-11T19:09:39Z</dc:date>
    </item>
    <item>
      <title>2023 Updates in Review: Malware Analysis and Threat Hunting</title>
      <link>https://www.reversinglabs.com/blog/2023-updates-in-review-malware-analysis-and-threat-hunting</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/2023-updates-in-review-malware-analysis-and-threat-hunting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-Malware-Analysis-and-Threat-Hunting.webp" alt="2023 Updates in Review: Malware Analysis and Threat Hunting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Throughout ReversingLabs’ 14-year history, our products have constantly excelled and improved to tailor the needs of our customers and match the changing cybersecurity threat landscape. 2023 was no exception to this growth in product quality. This past year, we have delivered key improvements to ReversingLabs &lt;a href="https://www.reversinglabs.com/products/file-reputation-service"&gt;Threat Intelligence&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/products/enterprise-scale-file-anlaysis-software"&gt;Elastic Threat Infrastructure&lt;/a&gt;, and &lt;a href="https://www.reversinglabs.com/products/malware-threat-hunting-and-investigations"&gt;Threat Analysis &amp;amp; Hunting&lt;/a&gt; solutions, providing more efficient and cutting-edge platforms fit for the busy security practitioner.&amp;nbsp;&lt;br&gt;&lt;br&gt;Here are the major improvements to ReversingLabs malware analysis and threat hunting solutions in various areas that are helpful to our customers.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-Malware-Analysis-and-Threat-Hunting.webp?width=1400&amp;amp;height=732&amp;amp;name=2023-Updates-in-Review-Malware-Analysis-and-Threat-Hunting.webp" width="1400" height="732" alt="Malware Analysis and Threat Hunting" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Throughout ReversingLabs’ 14-year history, our products have constantly excelled and improved to tailor the needs of our customers and match the changing cybersecurity threat landscape. 2023 was no exception to this growth in product quality. This past year, we have delivered key improvements to ReversingLabs &lt;a href="https://www.reversinglabs.com/products/file-reputation-service"&gt;Threat Intelligence&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/products/enterprise-scale-file-anlaysis-software"&gt;Elastic Threat Infrastructure&lt;/a&gt;, and &lt;a href="https://www.reversinglabs.com/products/malware-threat-hunting-and-investigations"&gt;Threat Analysis &amp;amp; Hunting&lt;/a&gt; solutions, providing more efficient and cutting-edge platforms fit for the busy security practitioner.&amp;nbsp;&lt;br&gt;&lt;br&gt;Here are the major improvements to ReversingLabs malware analysis and threat hunting solutions in various areas that are helpful to our customers.&lt;/p&gt;  
&lt;h2&gt;Dynamic Analysis&lt;/h2&gt; 
&lt;p&gt;To mitigate modern-day threats and potential attacks, a complete understanding of malware behavior is a must. ReversingLabs continues to increase file analysis depth and coverage by combining our high-speed static analysis with new dynamic analysis capabilities.&lt;/p&gt; 
&lt;p&gt;In 2023, ReversingLabs further enhanced our RL Cloud Sandbox dynamic analysis capabilities for the A1000 and TitaniumCloud.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-1.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-1.webp?width=1400&amp;amp;name=2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-1.webp" alt="Display of RL Cloud Sandbox Analysis Summary" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 1: Display of RL Cloud Sandbox Analysis Summary. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;File classification has been improved by additionally using RL Cloud Sandbox dynamic analysis results with ReversingLabs proprietary static analysis, simplifying the process of deciding if a sample is malicious. For the A1000 platform, improvements include the ability to automatically download dropped files from RL Cloud Sandbox and analyze these files using RL’s TitaniumCore static analysis, eliminating the need to download artifacts locally. For TitaniumCloud, the solution’s dynamic analysis capabilities have been expanded to support MacOS, Linux, and Windows 11 profiles, all in a single interface.&lt;/p&gt; 
&lt;h2&gt;Network Threat Intelligence&lt;/h2&gt; 
&lt;p&gt;ReversingLabs has the largest private repository of goodware and malware files in the world, which continues to grow each day. We know the importance of having validated, up-to-date file and network threat intelligence and the necessity to constantly improve on our solutions’ capabilities so that customers can trust and best utilize this data corpus. 2023’s improvements in this area consisted of updates to RL’s TitaniumCloud and TitaniumScale platforms.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-2.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-2.webp?width=1400&amp;amp;name=2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-2.webp" alt="A view of a domain search involved in malicious activity" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 2: A view of a domain search involved in malicious activity.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;For TitaniumCloud, users can now get up-to-date domain and IP reputations for blocking pertinent threats, based on a list of top threats, reputation data from various sources, statistics for downloaded malicious files, and a list of related URLs. Additionally, TitaniumCloud now delivers more lightweight, fast and simple lookups for domains, IPs, and URLs, which better automates network reputation workflows. Regarding TitaniumScale, users now can configure the retrieval of TitaniumCloud reputation for all network IOCs (Indicators of Compromise) found during file analysis, which enables valuable insights into potential threats and vulnerabilities.&lt;/p&gt; 
&lt;h2&gt;Data Visualization&lt;/h2&gt; 
&lt;p&gt;ReversingLabs understands how important it is for SOC teams to analyze data efficiently and meaningfully, which is why continual enhancements and improvements to data visualization are a must. This year, the A1000 platform had several data visualization improvements. These include a more intuitive navigation design for users when previewing samples, eliminating the need for a user to open an individual sample summary screen just to assess it. Also, antivirus detections are now displayed on the Cloud Sample Summary page and an expanded row from the Search interface improves the efficiency of triage processes for A1000 users.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-3.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-3.webp?width=1400&amp;amp;name=2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-3.webp" alt="Display of expanded row sample preview in the A1000 platform" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 3: Display of expanded row sample preview in the A1000 platform.&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Threat Hunting&lt;/h2&gt; 
&lt;p&gt;Easing the job of threat hunters is what we do best, which is why ReversingLabs prioritizes improving such capabilities within our solutions. For the A1000 platform, improvements in 2023 included a new and intuitive Relationships Graph, which offers a simplified, node-based graphical overview of opened samples and all metadata connected to them. This gives enterprise SOCs a straightforward visual understanding of a sample and its related network data and files.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-4.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-4.webp?width=1400&amp;amp;name=2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-4.webp" alt="Display of the A1000 platform’s Relationships Graph" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 4: Display of the A1000 platform’s Relationships Graph.&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;YARA Rules&lt;/h2&gt; 
&lt;p&gt;YARA is another area ReversingLabs continues to make improvements and enhancements to help threat hunting teams. In 2023, this included improving YARA import workflows by making it easier to upload rulesets from 3rd party repositories, as well as allowing users to select individual rules during the import of larger YARA rulesets. Another key YARA improvement is a ‘test run’ option so users can quickly validate newly created rulesets against a subset of samples, saving significant development time when it comes to writing and refining YARA rules.&lt;/p&gt; 
&lt;h2&gt;File Analysis&lt;/h2&gt; 
&lt;p&gt;For improved file analysis, ReversingLabs made several updates to the TitaniumScale platform in 2023. Users now have more control over TitaniumCore performance through the ability to choose between two processing modes: high-speed or rich report metadata. Additionally, new options for file analysis outputs reduce report sizes and process faster than before, creating a more efficient workflow.&lt;/p&gt; 
&lt;h2&gt;Automations and Integrations&lt;/h2&gt; 
&lt;p&gt;Making our solutions more intuitive and compatible with other services is a high priority for our team, which is why several notable improvements have been made to the TitaniumScale platform in 2023. This includes an updated global navigation bar for better visibility into supported integrations, connector configuration, and statuses, as well as ease of administration for the user. An additional improvement to the platform is a centralized interface for automated deployment, configuration and updating of all appliances managed by C1000, improving workflow efficiency, and ensuring consistency.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-5.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-5.webp?width=1400&amp;amp;name=2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-5.webp" alt="Improved centralized interface for appliance management" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 5: Improved centralized interface for appliance management&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;User Experience&lt;/h2&gt; 
&lt;p&gt;ReversingLabs takes the user experience (UX) seriously for all of our solutions, which is why the TitaniumScale platform underwent new UX improvements in 2023. One of these updates is that files can now be examined on C1000’s Analytics Dashboard, delivering live insights into detected threats. This provides greater visibility into an organization’s security posture and improves the efficiency of hunting and triage workflows for the SOC. In addition, SOC analysts can now perform further analysis of files via one-click pivoting to the A1000 Sample Summary from the C1000 Analytics Dashboard, which enhances investigation and hunting workflow efficiency for security teams.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-6.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-6.webp?width=1400&amp;amp;name=2023-Updates-in-Review-%20Malware-Analysis-and-Threat-Hunting-figure-6.webp" alt="C1000 Analytics Dashboard with one-click pivoting to A1000 sample summary" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="font-weight: bold; font-size: 16px; text-align: center;"&gt;&lt;br&gt;Figure 6: C1000 Analytics Dashboard with one-click pivoting to A1000 sample summary&lt;/p&gt; 
&lt;h2&gt;The Work Doesn’t Stop Here&lt;/h2&gt; 
&lt;p&gt;The improvements ReversingLabs made to its solutions in 2023 empower our customers to more efficiently manage their enterprise SOCs and mitigate any modern-day cyber threats coming their way. RL is constantly staying up to speed with today’s threat landscape to ensure that our solutions properly serve our customers' needs. Change is constant in cybersecurity, so our customers can expect more improvements to ReversingLabs Threat Intelligence, Elastic Threat Infrastructure, and Threat Analysis &amp;amp; Hunting solutions in 2024.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F2023-updates-in-review-malware-analysis-and-threat-hunting&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products &amp; Technology</category>
      <pubDate>Wed, 10 Jan 2024 12:30:00 GMT</pubDate>
      <author>contact@reversinglabs.com (ReversingLabs)</author>
      <guid>https://www.reversinglabs.com/blog/2023-updates-in-review-malware-analysis-and-threat-hunting</guid>
      <dc:date>2024-01-10T12:30:00Z</dc:date>
    </item>
    <item>
      <title>Zoom joins the vulnerability fray: Will VISS move the needle on AppSec?</title>
      <link>https://www.reversinglabs.com/blog/zoom-joins-the-vulnerability-fray-will-it-move-the-needle-on-appsec</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/zoom-joins-the-vulnerability-fray-will-it-move-the-needle-on-appsec" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/move-needle-zoom-viss-vulnerability-scoring.jpg" alt="Zoom joins the vulnerability fray: Will VISS move the needle on AppSec?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;Zoom, best known for its online videoconferencing and collaboration platform, is getting into vulnerability management. The company has announced its &lt;a href="https://viss.zoom.com/specifications"&gt;&lt;span&gt;Vulnerability Impact Scoring System&lt;/span&gt; (VISS)&lt;/a&gt;, a free-to-use framework for evaluating the impact of security vulnerabilities on computer systems infrastructure, technology stacks, and protected data.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/move-needle-zoom-viss-vulnerability-scoring.jpg?width=700&amp;amp;height=366&amp;amp;name=move-needle-zoom-viss-vulnerability-scoring.jpg" width="700" height="366" alt="move-needle-zoom-viss-vulnerability-scoring" style="height: auto; max-width: 100%; width: 700px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;Zoom, best known for its online videoconferencing and collaboration platform, is getting into vulnerability management. The company has announced its &lt;a href="https://viss.zoom.com/specifications"&gt;&lt;span&gt;Vulnerability Impact Scoring System&lt;/span&gt; (VISS)&lt;/a&gt;, a free-to-use framework for evaluating the impact of security vulnerabilities on computer systems infrastructure, technology stacks, and protected data.&lt;/p&gt;  
&lt;p&gt;VISS is designed to "objectively" capture the principal impact characteristics of software, hardware, and firmware vulnerabilities, Zoom said. While the industry-standard &lt;a href="https://www.reversinglabs.com/glossary/common-vulnerability-scoring-system-cvss"&gt;Common Vulnerability Scoring System (CVSS)&lt;/a&gt; is used to subjectively evaluate vulnerability reports primarily from an attacker’s perspective and assumes the reasonable worst-case impact, Zoom explained, VISS focuses on measuring the responsibly demonstrated impact of a vulnerability from the defender’s perspective.&lt;/p&gt; 
&lt;p&gt;The theoretical possibility of exploitation is not considered with VISS, but rather only the actual exploitation that has been demonstrated, Zoom said. The numerical scores generated indicate the relative impact severity within the given environment. It is important to understand that VISS is not meant as a replacement for CVSS, but as a complementary system of evaluation, the company stressed.&lt;/p&gt; 
&lt;p&gt;Zoom's VISS is not the first effort to move the ball forward on vulnerabilities with scoring. &lt;a href="https://www.first.org/epss/"&gt;The Exploit Prediction Scoring System (EPSS),&lt;/a&gt; first launched in April 2020, &lt;a href="https://www.first.org/epss/"&gt;advanced to version 3.0 &lt;/a&gt;late last year as a complementary tool&lt;span&gt; to CVSS, by adding more value to software risk scoring,&amp;nbsp;&lt;/span&gt;&lt;span&gt;combining descriptive information about vulnerabilities — and evidence of actual exploitation in the wild.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Here's what you need to know about Zoom's VISS, how it compares to EPSS — and how it can advance your application security (AppSec).&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See ReversingGlass:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/reversingglass/epss-3.0-cvss-why-prioritizing-software-risk-is-key"&gt;EPSS 3.0 + CVSS: Why Prioritizing Software Risk is Key&lt;/a&gt; | Learn more: &lt;a href="https://www.reversinglabs.com/blog/6-reasons-software-security-teams-need-to-go-beyond-vulnerability-response"&gt;Why AppSec teams should go beyond legacy vulnerabilities&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;How VISS measures vulnerability impacts&lt;/h2&gt; 
&lt;p&gt;VISS aims to provide greater efficiency, taking into account more infrastructure and environmental factors, and ideally providing focus on the highest-impact vulnerabilities, said John Gallagher, vice president of the IoT security firm Viakoo Labs.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Organizations need efficiency in cybersecurity operations, both because of limited security resources and because the longer it takes to react to a vulnerability, the more possibility there is for exploitation."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/b2bpipelinebuilder/"&gt;John Gallagher&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;VISS metrics, which produce scores from 0 to 100, take into account 13 aspects of impact for each vulnerability:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Platform type&lt;/strong&gt;, which allows the user to specify the type of computing platform impacted by the security vulnerability, not necessarily where the security vulnerability was found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Platform confidentiality&lt;/strong&gt;, which allows the user to specify the impact on the confidentiality of the platform by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Platform integrity&lt;/strong&gt;, which allows the user to specify the impact on the integrity of the platform by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Platform availability&lt;/strong&gt;, which allows the user to specify the impact on the availability of the platform by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Infrastructure tenancy&lt;/strong&gt;, which allows the user to specify the tenancy of the infrastructure on which the security vulnerability was found, but only when there is some level of platform impact present.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Software tenancy&lt;/strong&gt;, which allows the user to specify the tenancy of the software on which the security vulnerability was found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data tenancy&lt;/strong&gt;, which allows the user to specify the tenancy of the data on which the security vulnerability was found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Tenants impacted&lt;/strong&gt;, which allows the user to specify a summary range of tenants impacted by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data confidentiality&lt;/strong&gt;, which allows the user to specify the impact on the confidentiality of the data involved by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data integrity&lt;/strong&gt;, which allows the user to specify the impact on the integrity of the data involved by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data availability&lt;/strong&gt;, which allows the user to specify the impact on the availability of the data involved by the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data classification&lt;/strong&gt;, which allows the user to specify the internal classification of the data involved in the successful exploitation of the security vulnerability found.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Upstream compensating controls&lt;/strong&gt;, which allows the user to specify the existence of any compensating security controls within the impacted software or infrastructure that have a positive defensive impact against the successful exploitation of the security vulnerability found.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="font-weight: normal;"&gt;How VISS fills gaps in the CVSS&lt;/h2&gt; 
&lt;p&gt;New scoring frameworks such as VISS are emerging to address specific needs or perspectives that CVSS might not fully cover, said James McQuiggan, an advocate at the security awareness training company KnowBe4.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt; “While CVSS is often criticized, using &lt;/span&gt;&lt;span style="font-size: 24px;"&gt;EPSS&lt;/span&gt;&lt;span style="font-size: 24px;"&gt; or VISS has the potential to provide more tailored or comprehensive assessments for particular environments or threats. The EPSS is also open source and can be updated or openly discussed, whereas the CVSS is controlled, with very few adjustments without significant changes or implementations.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/jmcquiggan/"&gt;James McQuiggan&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Zoom said that while it owns all rights and interests in VISS, it licenses it to the public free for use, subject to certain conditions. Zoom also requires that any individual or entity using VISS give proper attribution, where applicable, that VISS is owned by Zoom and is used with permission. In addition, Zoom requires as a condition of use that any individual or entity that publishes VISS scores provide both the score and the scoring vector so others can understand how the score was derived.&lt;/p&gt; 
&lt;p&gt;Zoom also noted that unlike CVSS, VISS metric options and the weights assigned to those options are customizable by the user as needed to meet the needs of the overall environment, software, and data involved. This flexibility allows each organization to use VISS in a manner specific to it industry, requirements, and risk profile, it added.&lt;/p&gt; 
&lt;p&gt;Daniel Kennedy, research director for information security and networking at 451 Research, which is part of S&amp;amp;P Global Market Intelligence, said the CVSS has been criticized, sometimes unfairly, for not considering different contexts that may affect vulnerability severity. But he said VISS could end up “yet another standard."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Folks tend to create these things in pursuit of solving some problem, whether it be the current models not addressing their specific use case, or existing models having more general gaps.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/danieltkennedy/"&gt;Daniel Kennedy&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Going beyond vulnerability management alone is key&lt;/h2&gt; 
&lt;p&gt;Vulnerability management has become the battle cry of the cybersecurity world, with organizations drowning in a sea of vulnerabilities and struggling to prioritize remediation efforts, said Sarah Jones, a cyberthreat intelligence research analyst at the cybersecurity services firm Critical Start.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“This is where vulnerability scoring systems like VISS and EPSS step in, offering guidance through the storm."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Sarah Jones&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Although both systems aim to address deficiencies in CVSS, they approach their mission in different ways, Jones said. "It analyzes 13 factors and assigns 0 to 100 severity scores based on actual damage from past exploits,” she said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Think of VISS as a data-driven post-mortem."&lt;br&gt;—Sarah Jones&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;VISS aligns vulnerability patching with demonstrably impactful threats, supporting incident response and mitigating ongoing attacks, Jones said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“However, it doesn't predict future assaults, leaving them lurking in the shadows.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Sarah Jones&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;VISS vs EPSS: How they compare&lt;/h2&gt; 
&lt;p&gt;EPSS takes a forward-looking approach using threat intelligence and vulnerability characteristics to estimate the chance of exploitation within 30 days.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Like a security weather forecast, it identifies storm clouds most likely to unleash fury, enabling proactive risk mitigation. However, its reliance on complex algorithms and limited historical data introduces uncertainties, requiring cautious interpretation.”&lt;br&gt;—Sarah Jones&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;VISS and EPSS are complementary tools, not rivals, Jones said. “Choose based on your priorities — address past damage with VISS or predict future threats with EPSS. Combine their strengths with CVSS to navigate the cybersecurity landscape.”&lt;/p&gt; 
&lt;p&gt;Proactive vulnerability management is a strategic investment in your organization's future, Jones said. “By understanding these systems and taking a holistic approach, you can stay ahead of the curve and keep those vulnerability monsters at bay.”&lt;/p&gt; 
&lt;p&gt;However, McQuiggan cautioned about obsessing over vulnerabilities in general.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Focusing on vulnerabilities is a proactive approach to cybersecurity, aiming to prevent exploits before they occur. However, it should be part of a broader security strategy that includes protection against malware, zero-day exploits, and social engineering, since addressing vulnerabilities is not a silver bullet and does not guarantee defense and risk reduction against all cyber threats.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—James McQuiggan&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Matt Rose, field CISO for ReversingLabs, said security teams are facing alert fatigue "across the board," so new vulnerability scoring systems are a step in the right direction.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span&gt;"There's just not enough time, resources, and budget to address everything."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Rose said the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security"&gt;increase in sophisticated supply chain attacks&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;means&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/owasp-program-founder-calls-for-supply-chain-security-that-goes-beyond-vulnerability-detection"&gt;its time to go beyond vulnerabilities&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;when it comes to managing risk across the software development lifecycle (SDLC). He advocates for focusing on active malware instead, citing the Enduring Security Framework group's &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;call to for binary analysis and reproducible builds.&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;Complex binary analysis&lt;/a&gt;, which focuses on malware, can help organizations evaluate and verify the security of not just internally developed software, but also third-party commercial software in their environment, before it is released.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span&gt;"&lt;/span&gt;It is the final examination of a package for software supply chain risk, which allows for trust in that piece of software that you are either developing for your customers or that you are buying to help operate your business."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fzoom-joins-the-vulnerability-fray-will-it-move-the-needle-on-appsec&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 09 Jan 2024 16:03:54 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/zoom-joins-the-vulnerability-fray-will-it-move-the-needle-on-appsec</guid>
      <dc:date>2024-01-09T16:03:54Z</dc:date>
    </item>
    <item>
      <title>A definitive guide: Federal software supply chain security initiatives</title>
      <link>https://www.reversinglabs.com/blog/a-definitive-guide-to-software-supply-chain-guidance</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/a-definitive-guide-to-software-supply-chain-guidance" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/definitive-guide-sscs-guidance.png" alt="A definitive guide: Federal software supply chain security initiatives" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;Software supply chain security is now top-of-mind for software producers and enterprise consumers alike, given &lt;span&gt;t&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks"&gt;&lt;/a&gt;&lt;span&gt;he dramatic increase in threats (as noted in ReversingLabs' &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;State of Software Supply Chain Security 2024&lt;/a&gt; report) — and the steady growth in &lt;a href="https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks"&gt;software supply chain attacks&lt;/a&gt;&lt;/span&gt;. But the private sector isn’t alone in taking notice of the epidemic.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Federal-Blog-timeline-2024.webp?width=700&amp;amp;height=366&amp;amp;name=Federal-Blog-timeline-2024.webp" width="700" height="366" alt="Federal-Blog-timeline-2024" style="height: auto; max-width: 100%; width: 700px;"&gt;&lt;br&gt;Software supply chain security is now top-of-mind for software producers and enterprise consumers alike, given &lt;span&gt;t&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;he dramatic increase in threats (as noted in ReversingLabs' &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;State of Software Supply Chain Security 2024&lt;/a&gt; report) — and the steady growth in &lt;a href="https://www.reversinglabs.com/blog/a-partial-history-of-software-supply-chain-attacks"&gt;software supply chain attacks&lt;/a&gt;&lt;/span&gt;. But the private sector isn’t alone in taking notice of the epidemic.&lt;/p&gt;  
&lt;p&gt;The U.S. federal government has turned its attention to software supply chain security in recent years, and more recently it has stepped up its guidance with more comprehensive initiatives such as &lt;a href="https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign"&gt;Secure by Design&lt;/a&gt;&amp;nbsp;and specific guidance on tooling with the Enduring Security Framework's &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;call for comprehensive binary analysis and reproducible builds&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;What started with the White House’s &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;&lt;span&gt;Executive Order on Improving the Nation’s Cybersecurity&lt;/span&gt;&lt;/a&gt; (EO 14028) has grown into a comprehensive trove of compliance and guidance initiatives that has shaped the federal government’s policies on software supply chain security. Three years after EO 14028’s initial release, these efforts have begun to take effect, forcing software producers — particularly those that do business with the federal government — to take notice.&amp;nbsp;&lt;br&gt;&lt;br&gt;However, it's not just software organizations working with the government that need to get up to speed on guidance. Analyst firm Gartner notes in its &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report"&gt;“Mitigate Enterprise Software Supply Chain Security Risks”&lt;/a&gt; report that open-source communities and enterprises alike should increase their scrutiny of supply chain risks and take action to prioritize software supply chain security protections.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Here are 2023’s major federal initiatives for improving software supply chain security, including a breakout of guidelines versus mandates. Combined with our &lt;a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security"&gt;definitive timeline for software supply chain security guidance&lt;/a&gt;, teams can better assess what changes they need to make with their software security approaches in 2024.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Definitive timeline: &lt;a href="https://www.reversinglabs.com/blog/timeline-of-federal-guidance-on-software-supply-chain-security"&gt;Federal guidance on software supply chain security&lt;/a&gt; | Key takeaways: &lt;a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security-2024-key-takeaways"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;National Cybersecurity Strategy&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;March 2023 | Guidance&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The National Cybersecurity Strategy (&lt;a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf"&gt;&lt;span&gt;PDF&lt;/span&gt;&lt;/a&gt;) outlines the federal government’s continued efforts to improve the nation’s cybersecurity. The strategy comprises five pillars that address the federal government’s goals and is framed by two fundamental shifts: rebalancing the responsibility to defend cyberspace, and realigning incentives in favor of long-term investments.&lt;/p&gt; 
&lt;h2&gt;Secure by Design&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;April 2023 | Guidance&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.cisa.gov/securebydesign"&gt;&lt;span&gt;Secure by Design&lt;/span&gt;&lt;/a&gt;, released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) along with 17 other U.S. and international partners, is an initiative that aims to rebalance the burdens caused by cybersecurity risk from the end user to technology manufacturers and providers. The initiative asks software producers to take ownership at the executive level to ensure that their products are intentionally made with security in mind and that security is also enabled after the product is manufactured and released. One key aim of Secure by Design is to shift liability from the consumers of software to the producers.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Cybersecurity Information Sheet on Defending CI/CD Environments&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;June 2023 | Guidance&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The Cybersecurity Information Sheet (CSI) on &lt;a href="https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF"&gt;&lt;span&gt;Defending Continuous Integration/Continuous Delivery (CI/CD) Environments (PDF)&lt;/span&gt;&lt;/a&gt;, released by CISA and the National Security Agency, outlines recommendations and best practices for improving defenses in the software development, security, and operations (DevSecOps) process. It explains how to properly integrate security into CI/CD environments to ensure that security is not an afterthought for software products being developed. It also outlines what steps software publishers should take to continue actively hardening their software’s defenses post-build.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;SEC Rules for Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;July 2023 | Mandate&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The SEC &lt;a href="https://www.sec.gov/news/press-release/2023-139"&gt;&lt;span&gt;released a set of rules&lt;/span&gt;&lt;/a&gt; on “Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure.” Since August 2023, SEC registrants have had to disclose material cybersecurity incidents and annually disclose “basic material information” about the company’s cybersecurity risk management, strategy, and governance practices. Information that needs to be disclosed could include updates on the state of software supply chain security at an organization or details regarding a software supply chain attack that a company has suffered from.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Cybersecurity in Medical Devices&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;September 2023 | Mandate&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The FDA released &lt;a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cybersecurity-medical-devices-quality-system-considerations-and-content-premarket-submissions"&gt;&lt;span&gt;“Cybersecurity in Medical Devices: Quality System Consideration and Content of Premarket Submissions”&lt;/span&gt;&lt;/a&gt; as a reference document for device manufacturers that must now report on their medical devices’ cybersecurity, in accordance with part (f) of Sec. 524B in H.R.2617, which includes the use of software bills of materials (SBOMs). In addition to providing an SBOM that includes the medical device’s use of commercial, open-source and off-the-shelf software components, manufacturers will also need to disclose how they deal with cybersecurity vulnerability management.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Software Identification Ecosystem Option Analysis&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;October 2023 | Guidance&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;CISA &lt;a href="https://www.cisa.gov/resources-tools/resources/software-identification-ecosystem-option-analysis"&gt;&lt;span&gt;put forward new guidelines&lt;/span&gt;&lt;/a&gt; for a “Software Identification Ecosystem,” with the goal of it being both a precise and generic resource that supports software “grouping.” A successful software identifier scheme should also include properties such as software names and versions that are used in both SBOM creation and vulnerability management — two important use cases.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Recommended Practices for SBOM Consumption&lt;/h2&gt; 
&lt;p&gt;&lt;em&gt;November 2023 | Guidance&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;As part of its second phase of the “Securing the Software Supply Chain” guide, the Enduring Security Framework Software Supply Chain Working Panel (ESF) released &lt;a href="https://media.defense.gov/2023/Nov/09/2003338086/-1/-1/0/SECURING%20THE%20SOFTWARE%20SUPPLY%20CHAIN%20RECOMMENDED%20PRACTICES%20FOR%20SOFTWARE%20BILL%20OF%20MATERIALS%20CONSUMPTION.PDF"&gt;&lt;span&gt;“Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption” (PDF)&lt;/span&gt;&lt;/a&gt;. The document serves as an SBOM-specific follow-up to the first three parts of the “Securing the Software Supply Chain” guide, which are aimed at software developers, suppliers, and customers. All of these stakeholders should use the guidance as a basis for describing, assessing, and measuring security practices relative to the software lifecycle, as well as the acquisition, deployment, and operational phases of the software supply chain, respective to their unique responsibilities.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Looking ahead&lt;/h2&gt; 
&lt;p&gt;In 2024 and beyond, the federal government has indicated, it will continue to shape cybersecurity policy, including software supply chain security, in several ways.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.cisa.gov/cybersecurity-strategic-plan"&gt;&lt;span&gt;CI&lt;/span&gt;&lt;span&gt;SA Strategic Plan for 2024-2026&lt;/span&gt;&lt;/a&gt;, released in August 2023, outlines the government’s efforts regarding active threats, future threats and improving the security of the software ecosystem.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Among other things, CISA said that it aims to:&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Increase the number of technology providers that have published detailed threat models that document both areas in need of increased security and potential threats/adversaries&lt;/li&gt; 
 &lt;li&gt;Increase the number of technology providers that have implemented the &lt;a href="https://www.reversinglabs.com/glossary/secure-software-development-framework-ssdf"&gt;NIST Secure Software Development Framework (SSDF)&lt;/a&gt; and the various security controls it entails&amp;nbsp;&lt;/li&gt; 
 &lt;li&gt;Increase the number of software producers that publish secure-by-design road maps for their product that lay out changes the producer is making to their software development processes, the measurement of software defect rates, as well as goals for improvement such as the transition to memory-safe programming languages&amp;nbsp;&lt;/li&gt; 
 &lt;li&gt;Increase the number of technology providers that regularly publish security-relevant statistics such as multifactor authentication (MFA) adoption, use of unsafe legacy protocols, and the prevalence of customers using unsupported product versions&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These efforts aim to increase engagement by software producers are sure to be accompanied by additional guidelines and mandates from federal agencies or regulatory bodies.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Focus on AI&lt;/h2&gt; 
&lt;p&gt;CISA has also indicated that it will focus on security risks related to the adoption of artificial intelligence (AI) in the coming years, with initiatives designed to help organizations safely use AI to advance cybersecurity while also protecting them from AI-driven threats, or efforts by adversaries to manipulate or abuse AI systems. As with secure software development, CISA’s work to secure AI will build on &lt;a href="https://www.nist.gov/itl/ai-risk-management-framework"&gt;NIST’s AI Risk Management Framework&lt;/a&gt;.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fa-definitive-guide-to-software-supply-chain-guidance&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 04 Jan 2024 17:10:00 GMT</pubDate>
      <author>carolynn.vanarsdale@reversinglabs.com (Carolynn van Arsdale)</author>
      <guid>https://www.reversinglabs.com/blog/a-definitive-guide-to-software-supply-chain-guidance</guid>
      <dc:date>2024-01-04T17:10:00Z</dc:date>
    </item>
    <item>
      <title>The state of container security: 5 key steps to locking down your releases</title>
      <link>https://www.reversinglabs.com/blog/state-of-container-security-release-confidently</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/state-of-container-security-release-confidently" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/How-to-release-software-confidently.jpg" alt="The state of container security: 5 key steps to locking down your releases" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Container technologies are rapidly transforming application development and deployment practices at many organizations. But they also present a minefield of security risks for the growing number of organizations using the technology to package and deploy modern, microservices-based applications.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="font-weight: bold; font-size: 20px;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/How-to-release-software-confidently.jpg?width=1400&amp;amp;name=How-to-release-software-confidently.jpg" alt="How-to-release-software-confidently" style="width: 1400px;" width="1400"&gt;&lt;/p&gt; 
&lt;p&gt;Container technologies are rapidly transforming application development and deployment practices at many organizations. But they also present a minefield of security risks for the growing number of organizations using the technology to package and deploy modern, microservices-based applications.&lt;/p&gt;  
&lt;p style="font-size: 18px;"&gt;Containers are highly portable because they include everything that an application needs to run, such as dependences and configuration files. So, for development teams, containers offer a way to build an application once and deploy it across on-premises, multicloud, and virtualized environments. Container orchestration software such as Docker Swarm or Kubernetes has made it relatively easy for development teams to centrally deploy and manage containerized apps.&lt;/p&gt; 
&lt;p style="font-size: 18px;"&gt;In development environments, containers have made it easier for developers to automate the pipeline and more efficiently move applications from testing to production. Many organizations are taking advantage of container technologies to migrate internally developed applications to the cloud or to build cloud-native applications from scratch. Server consolidation and multicloud adoption have also contributed to container adoption.&lt;/p&gt; 
&lt;p&gt;Primary risks include those related to vulnerable container images, poor access controls, overly permissive privileges, exposed attack surfaces, and misconfigured runtimes. Over the last couple of years, the rise in software supply chain attacks has increased container security risks — and heightened the need for organizations to deploy controls for managing and mitigating those risks.&lt;/p&gt; 
&lt;p&gt;As &lt;span&gt;containers&lt;/span&gt; have become fundamental to modern software development and deployment, it is vital to secure them, said Patrick Tiquet, vice president for security and architecture at Keeper Security. &amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Securing containers involves implementing a combination of best practices, tools, and processes to protect containerized applications and their environments."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/patrick-tiquet-1ba9b497/"&gt;Patrick Tiquet&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Here are five essential best practices — and recommendations for modern application security tooling — to lock down your organization's containers and ensure secure software releases.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;[ Get the new report:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;&lt;span&gt;&amp;nbsp;| Join the conversation:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;Webinar: State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;&lt;/a&gt;&lt;span&gt;&amp;nbsp;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;1. Add controls for containers accessing sensitive data&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;Users, applications, and devices should be allowed to communicate with and access &lt;span style="color: black; background-color: white;"&gt;only those &lt;/span&gt;resources that are required within their role. The best way to ensure that is to follow the principles of zero trust at the user, application, and network layers, said Anthony Tam, manager of security engineering at Tigera. In addition, ensure that all sensitive data is encrypted at rest and in transit, regardless of whether the &lt;span style="color: black; background-color: white;"&gt;destination&lt;/span&gt; is internal or external. Ensure that you use the latest industry-standard crypto algorithms, Tam said.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Kong Yew Chan, director of product management, container security at Qualys, said key encryption should be secured with external key management, so that only authorized individuals can retrieve the encryption key to encrypt or decrypt the sensitive data.&lt;span style="color: #500050; background-color: white;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Data encryption is a mandatory requirement for customer PII data to meet compliance requirements such as GDPR. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;Use network segmentation to limit only authorized &lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;containers&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt; to access sensitive data volumes, and use the principle of least privilege to limit the number of authorized users who have access to sensitive data."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/kongyew/"&gt;Kong Yew Chan&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;KC Berg, chief architect at the API security testing firm StackHawk, said administrators should treat all containers as if they contain personally identifiable information (PII). For &lt;span&gt;containers&lt;/span&gt; that need extra security controls, implement a separate namespace with role-based access control (RBAC) and even more limited access.&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #374151;"&gt;Berg said to l&lt;/span&gt;everage the &lt;span style="color: #374151;"&gt;Init Containers feature in Kubernetes to unmount/unset configuration files and/or secrets once the primary process has loaded them. &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="color: #374151;"&gt;"&lt;/span&gt;Run a sidecar or use a service such as a reverse proxy in front of the container's exposed network service port that monitors for PII data patterns and generates alerts if unexpected access is detected."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/kcberg/" style="font-style: italic;"&gt;KC Berg&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;2. Use runtime security to detect anomalous behaviors&lt;/h2&gt; 
&lt;p&gt;Continuously monitor and analyze application behavior during runtime to identify and respond to threats in real time. Runtime tools can help reduce false positives by helping security teams detect attacks, risks, and anomalous behaviors that are specific to an organization's infrastructure, said Tam.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"They can also help security teams respond to incidents in real time through actions like blocking network traffic to the affected&amp;nbsp;container, quarantining the&amp;nbsp;container, or other methods of preventing the spread of an attack."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/anthony-tam/"&gt;Anthony Tam&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Runtime security products also leverage automation for rapid investigation and response, and many can take containment actions such as killing processes or isolating workloads with a single click, Tam said.&lt;/p&gt; 
&lt;p&gt;Qualys' Chan said organizations should use technology based on extended Berkeley Packet Filter (eBPF) to monitor and protect c&lt;span&gt;ontainers&lt;/span&gt; during runtime. With eBPF-based technology, runtime behaviors, including file, process, and networking events, can be monitored and protected.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"For example, any unintended or unauthorized file access to specific system files such as 'etc/hosts' can be considered malicious. Users want to prevent malicious file access with container runtime so they can prevent potential threat risks and meet compliance requirements such as PCI-DSS."&lt;br&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;—Kong Yew Chan&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Create eBPF-based rules to protect against known threats. For example, treat any processes that are created from in-memory data as fileless malware. Alternatively, administrators can create whitelist rules that allow specific known behaviors while blocking unknown ones.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This approach ensures that all other events besides the well-known behaviors will not trigger potential attacks."&lt;br&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;—Kong Yew Chan&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;3. Mitigate dependency-related security risks&lt;/h2&gt; 
&lt;p&gt;Maintaining visibility into dependencies for&amp;nbsp;&lt;span&gt;container&lt;/span&gt; environments can be challenging, but organizations can take certain measures to mitigate risk from open-source and other third-party code dependencies.&lt;/p&gt; 
&lt;p&gt;Chan said organizations should use minimal base images or distroless images to build their &lt;span&gt;container&lt;/span&gt;&amp;nbsp;images. "The minimal base images will have limited dependencies, reducing the number of potential vulnerabilities," Chan says.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="font-size: 24px;"&gt;&lt;em&gt;"This approach will simplify base image dependency management and reduce the complexity of managing vulnerabilities of the base image."&lt;/em&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;—Kong Yew Chan&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;It's also a good idea to create a software bill of materials (SBOM) for container images. Open-source tools such as Dependency Tracker allow admins to maintain visibility into the software package dependencies within &lt;span&gt;container&lt;/span&gt; images, Chan said.&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;In addition, use Kubernetes inventories to maintain visibility for&amp;nbsp;&lt;span&gt;container&lt;/span&gt;&amp;nbsp;images in use. Running &lt;span&gt;containers&lt;/span&gt;&amp;nbsp;have specific&amp;nbsp;images with specific dependencies. "Therefore, users can identify vulnerabilities within those running&amp;nbsp;&lt;span&gt;containers&lt;/span&gt; and prioritize fixes related to exploitable vulnerabilities with critical severity," Chan said.&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;StackHawk's Berg said other measures organizations can take to maintain visibility into dependencies in container environments include enabling container scanning in the Docker registry, running a container registry as a cache and then scanning third-party containers, scanning containers for vulnerable packages on every pull request, and using vulnerability-testing tools.&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in; font-size: 24px;"&gt;&lt;em&gt;"Engineering teams should review vulnerabilities as part of a regular cadence. Once a good state has been reached, switch this to be pull request check-driven and treat vulnerable packages like any other software defect."&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;KC Berg&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;4. Control supply chain risks in container ecosystems&lt;/h2&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;Vulnerabilities in the software supply chain pose a major security risk in container environments. But there are several measures organizations can take to mitigate these risks, said Qualys' Chan. These include using base images only from trusted sources so images can be reproduced and verified and scanning images with tools such as software composition analysis to identify known vulnerabilities and potential license issues and such as binary analysis to identify malware. Chan said organizations should also scan images with for secrets, to prevent any from being leaked within the &lt;span&gt;container&lt;/span&gt;&amp;nbsp;images.&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in; font-size: 24px;"&gt;&lt;em&gt;"Sign&amp;nbsp;container images to ensure the authenticity of the image source. Signed container&amp;nbsp;images will prevent tampering with the immutable images, preventing malicious packages from being injected into the image."&lt;br&gt;&lt;span style="font-size: 24px;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;—Kong Yew Chan&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;It's also a good idea to deploy&amp;nbsp;&lt;span&gt;container&lt;/span&gt; runtime security tools such as binary analysis to detect configuration drifts and malicious threats in the runtime environments, Chan said.&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Deploy&amp;nbsp;container runtime security tools to detect configuration drifts, malicious threats in the runtime environments. This approach can detect and prevent threats in the runtime environment, thereby maintaining software supply chain integrity."&lt;br&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;—Kong Yew Chan&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-size: 18px;"&gt;Chris Romeo, co-founder and CEO of the threat modeling firm Devici, said that, ultimately, containers are nothing more than a stack of operating system and application packages bundled together that are vulnerable to security issues just as in any software environment.&lt;/p&gt; 
&lt;blockquote style="font-size: 18px;"&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"The attacker's focus on the software supply chain is the cause of the bulk of threats against container security in recent years."&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="http://twitter.com/edgeroute" style="font-style: italic;"&gt;Chris Romeo&amp;nbsp;&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;5. Use controls to protect against lateral movement&lt;/h2&gt; 
&lt;p&gt;Tam pointed to a &lt;span style="color: black;"&gt;&lt;a href="https://www.tigera.io/lp/calico-open-source-usage-adoption-2023/?utm_campaign=FY24-Calico-Open-Source-Survey&amp;amp;utm_medium=PR&amp;amp;utm_source=Web"&gt;recent survey that Tigera conducted&lt;/a&gt;&lt;/span&gt; of more than 1,200 users who are actively using Calico open-source networking and security tools in their container and Kubernetes environments. The survey found that 61% of Calico users were using workload access policies to limit pod-to-pod communication, 41% were using secure egress policies, and 24% were using microsegmentation to limit pod-to-pod communication.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"An overwhelming 85% of users said they needed to achieve network segmentation and protect east-west traffic. IT leaders need enhanced security controls at the workload level to reduce the risk of lateral movement of threats."&lt;br&gt;&lt;/span&gt;&lt;span style="font-size: 24px;"&gt;—Anthony Tam&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;Berg outlined four measures organizations can take to ensure isolation, prevent lateral movement, and detect anomalous behavior in container environments. First, ensure that containers run with the least privileges and that file and network access is secure.&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent; color: #484848;"&gt; For instance, run the primary process as a non-root user with limited access to container assets and mount all configurations as read only.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;Second, ensure that containers run one primary process as far as possible, and m&lt;span style="background-color: transparent; color: #484848;"&gt;ake sure a container's network access is limited to required resources.&lt;/span&gt;&lt;/p&gt; 
&lt;span style="font-size: 24px;"&gt;&lt;/span&gt;
&lt;br&gt; 
&lt;blockquote&gt; 
 &lt;p style="margin-top: 0in; margin-right: 0in; margin-bottom: 0in; padding-left: 0in;"&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Use your cloud providers IAM and SDN capabilities in combination with Kubernetes' RBAC to run containers with least privilege access to assets like databases and other services. Use service mesh and networking tools like istio or traefik to control K8s service-to-service connections."&lt;br&gt;—KC Berg&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Third, monitor containers via node/host services that can expose telemetry. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Organizations need to understand that just because an application runs in a &lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;container&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt; does not necessarily mean it is automatically secure, said Keeper Security's Tiquet.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The same discipline and best practices for scanning and managing vulnerabilities in on-prem and cloud server instances can and should be applied to containers."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Patrick Tiquet&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Rethinking container security requires the right tools&lt;/h2&gt; 
&lt;p style="font-size: 18px;"&gt;Build pipeline attacks are on the rise, and software supply chain security is front and center. With the potential for attackers to inject malware, tamper, or compromise signing, the focus for security teams needs to shift beyond vulnerabilities. To ensure container security, you need to know if someone has changed or introduced malware in your container images — just like your code.&lt;/p&gt; 
&lt;p style="font-size: 18px;"&gt;Choosing the right tool to run within the container to monitor for compromise and evaluate the current security posture is critical. So too is education and awareness for developers about the inherent risks in using containers, orchestration, and images for application development and deployment, Romeo said.&lt;/p&gt; 
&lt;p style="font-size: 18px;"&gt;Romeo recommended that development and security teams take the time to learn about tools that are currently available to help organizations secure container environments. They need to understand the capabilities of these tools and recognize the differences in the risks that container environments pose compared to typical app development and deployment pipelines.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Answer the questions: Are we scanning our containers for vulnerabilities? Are we monitoring running containers for compromise? Scope the depth of the problem, understand it, and then implement solutions."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Chris Romeo&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-size: 18px;"&gt;&lt;a href="https://www.linkedin.com/in/lisa-azevedo-7031274/"&gt;Lisa Azevedo&lt;/a&gt;, CEO of container security firm Containn, said one big limitation with many current container security products and services is that they are reactive, designed to detect after-the-fact security vulnerabilities. Many container security products allow organizations to scan for and detect known security issues but do little to prevent them from happening in the first place. Most tools, at best, allow organizations to get a point-in-time assessment of security vulnerabilities in the container environment, she said.&lt;/p&gt; 
&lt;p style="font-size: 18px;"&gt;Currently available container security tools generally are good at detecting existing vulnerabilities, providing a remediation report, and pushing the work of fixing the issues back to the development team. A growing number use machine learning to predict vulnerabilities in software under development. But they don’t give security teams an opportunity to stay ahead of the curve, because by the time organizations have a chance to remediate the detected issues, new ones likely have surfaced, Azevedo said.&lt;/p&gt; 
&lt;p style="font-size: 18px;"&gt;The key is to ensure container security by pushing it further left during the build process, Azevedo said. Organizations should be thinking about how to implement container security at scale from the beginning and finding ways to maintain control of container deployments and state. The focus should be on shrinking the attack surface while maintaining control of deployments and container state.&lt;/p&gt; 
&lt;p style="font-size: 18px;"&gt;Such capabilities are critical because many organizations are on the cusp of moving away from manual tools to intelligent tools for container development and deployment, Azevedo noted. The goal is to be able to spin up containers that are standardized for specific environments and integrate security and compliance features such as those required under various industry regulations and national data security and privacy mandates.&lt;/p&gt; 
&lt;p&gt;Matt Rose, field CISO at ReversingLabs, said new tools are needed to take on the rise of software supply chain attacks, and containers are an essential component. He said binary analysis, which was &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;recently recommended by the Enduring Security Framework (ESF) working group&lt;/a&gt;, is key. &lt;span&gt;Binary code analysis can help organizations evaluate and verify the security of both internally developed software and third-party commercial software before it is released into their environment, Rose said.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span&gt;&lt;em&gt;"It is the final examination of a package for software supply chain risk, which allows for trust in that piece of software that you are either developing for your customers or that you are buying to help operate your business."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fstate-of-container-security-release-confidently&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Container Security</category>
      <category>Dev &amp; DevSecOps</category>
      <pubDate>Wed, 03 Jan 2024 20:15:00 GMT</pubDate>
      <author>jaikumar.vijayan@gmail.com (Jaikumar Vijayan)</author>
      <guid>https://www.reversinglabs.com/blog/state-of-container-security-release-confidently</guid>
      <dc:date>2024-01-03T20:15:00Z</dc:date>
    </item>
    <item>
      <title>Key reasons third-party risk management programs fail</title>
      <link>https://www.reversinglabs.com/blog/key-reasons-organizations-fail-third-party-risk-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/key-reasons-organizations-fail-third-party-risk-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/gartner-sscs-risk.jpg" alt="Key reasons third-party risk management programs fail" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;More than 80% of organizations&amp;nbsp;in the last two years have experienced business interruptions caused by third parties, despite their investments in trying to tamp down risks created by their vendors and partners, a new &lt;span&gt;report&lt;/span&gt; by the analyst firm Gartner says.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/gartner-sscs-risk.jpg?width=1400&amp;amp;height=732&amp;amp;name=gartner-sscs-risk.jpg" width="1400" height="732" alt="gartner-sscs-risk" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;More than 80% of organizations&amp;nbsp;in the last two years have experienced business interruptions caused by third parties, despite their investments in trying to tamp down risks created by their vendors and partners, a new &lt;span&gt;report&lt;/span&gt; by the analyst firm Gartner says.&lt;/p&gt;  
&lt;p&gt;The &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2023-12-13-gartner-survey-finds-45-percent-of-organizations-experienced-third-party-related-business-interruptions-during-the-past-two-years"&gt;report, &lt;/a&gt;based on a survey of 376 senior executives involved in third-party cybersecurity risk management (TPCRM), arrives at a time when security professionals are increasingly concerned about the dangers associated with third-party risk and are struggling to get a handle on it.&lt;/p&gt; 
&lt;p&gt;Zachary Smith, senior principal for research at Gartner, said in a statement that third-party risk management is often resource-intensive, overly process-oriented, and short on results.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Cybersecurity teams struggle to build resilience against third party–related disruptions and to influence third party–related business decisions.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/zacharygiffordsmith/"&gt;Zachary Smith&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Matt Rose, field CISO for ReversingLabs, said organizations aren't getting the bang for the bucks they're putting into TPCRM. The proof? &lt;a href="https://www.reversinglabs.com/gartner-report-mitigate-enterprise-software-supply-chain-security-risks"&gt;The triple-digit rise in software supply chain attacks,&lt;/a&gt; which&amp;nbsp;have affected thousands of companies over the past few years.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"If organizations’ TPCRM programs were effective, then even if a third-party application or software package were compromised, it wouldn't cause much harm to the organization because the proper protections and resolution programs would be in place."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Demi Ben-Ari, CTO and co-founder of the TPCRM&amp;nbsp;firm Panorays, said one key reason risk management programs disappoint may be&amp;nbsp;how they're implemented.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Most third-party risk management efforts predominantly focus on compliance and governance and ticking boxes, which may not be sufficient to fully protect organizations."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/demibenari/"&gt;Demi Ben-Ari&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Here are the top reasons TPCRM&amp;nbsp;programs fail — and key considerations for developing an effective risk management program.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Get related Gartner Report: &lt;a href="https://www.reversinglabs.com/gartner-report-mitigate-enterprise-software-supply-chain-security-risks"&gt;Mitigate Enterprise Software Supply Chain Security Risks&lt;/a&gt; | Join Webinar: &lt;a href="https://www.reversinglabs.com/webinar/takeaways-from-gartner-software-supply-chain-report"&gt;Learn key takeaways from the Gartner report&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;Checklists just don't cut it anymore&lt;/h2&gt; 
&lt;p&gt;Charles Jones, software supply chain security evangelist at ReversingLabs, said traditional methods of assessing third-party risk, such as questionnaires, are slow and resource-intensive. Additionally, the assurance that can be derived from them is weak, because they are mainly based on self-attestation from the third party itself.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;As a result, organizations often spend a significant level of effort chasing their third parties, with little to show for it in terms of the amount of risk reduction they are able to demonstrate.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/charlie-jones3/"&gt;Charles Jones&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;ReversingLabs' Rose added that the biggest challenge to managing third-party risk is that, in the end, third parties are not responsible for the security of the software and applications they produce, &lt;a href="https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon"&gt;despite the Secure by Design initiative of the Cybersecurity and Infrastructure Security Agency&lt;/a&gt;.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Someone else is responsible, and in a lot of cases you have to take their word for it and trust that the third party is doing the right things.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Even if the information in the questionnaires is reliable, the manual processes of producing them and&amp;nbsp;intervening&amp;nbsp;during risk assessments can be overwhelming&amp;nbsp;for organizations to manage as the volume of third parties increases.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Today, large enterprises may rely on tens of thousands of third parties to operate their business. As a result, the ability to manage all of them using manual processes becomes unwieldy.”&lt;br&gt;—Charles Jones&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Unwieldy processes bog organizations down&lt;/h2&gt; 
&lt;p&gt;In addition, questionnaire-based TPCRM programs can be overly process-oriented, Rose said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Typically, questions come up, which leads to a lot of back and forth between many different stakeholders, which can result in a many-step process.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;James McQuiggan, a security awareness advocate at KnowBe4, said the need for consistency and accountability, especially for internal and external reporting, drives companies' emphasis on formalized procedures. Integrating risk management with other organizational processes, such as procurement and IT security, adds complexity. Even in a traditional security operations center (SOC), the evolving nature of best practices and standards in risk management demands a systematic approach. With the move to automation in the SOC, complexity grows.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“This is further compounded by the technological complexities of implementing automated risk assessment and monitoring tools, which require specific processes for effective deployment and interpretation. These combined factors contribute to the process-heavy nature of TPCRM, as organizations strive to manage risks consistently, efficiently, and with accountability.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/jmcquiggan/"&gt;James McQuiggan&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;Four key components of effective risk management&lt;/h2&gt; 
&lt;p&gt;Gartner noted that successful TPCRM depends on a security organization’s ability to influence overall business decision making and to deliver on three outcomes: resource efficiency, risk management, and resilience. However, the report says that enterprises struggle to be effective in two out of those three outcomes and that only 6% of organizations are effective in all three.&lt;/p&gt; 
&lt;p&gt;Gartner recommends four actions that security and risk management leaders should take to increase the effectiveness of their TPCRM programs, adding that organizations that have implemented any of these actions saw a 40% to 50% increase in TPCRM effectiveness:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Regularly review how effectively third-party risks are communicated to the business owner of the third-party relationship. &lt;/strong&gt;Chief information security officers (CISOs) need to regularly review how well the business understands their messaging around third-party risks to ensure they are providing actionable insights around those risks.&lt;br&gt;&lt;br&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Track third-party contract decisions to help manage risk acceptance by business owners. &lt;/strong&gt;Business owners will often choose to engage with a third party even if they are well-informed about associated cybersecurity risks. Tracking decisions helps security teams align compensating controls for risk acceptances and alerts security teams to particularly risky business owners that may require greater cybersecurity oversight.&lt;br&gt;&lt;br&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Conduct third-party incident response planning, such as playbooks and tabletop exercises. &lt;/strong&gt;Effective TPCRM goes beyond identifying and reporting cybersecurity risks. CISOs must ensure that the organization has strong contingency plans in place to prepare for unexpected scenarios and to be able to recover well in the wake of an incident.&lt;br&gt;&lt;br&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Work with critical third parties to mature their security risk management practices as necessary.&lt;/strong&gt; In a hyperconnected environment, a critical third party’s risk is also an organization’s risk. Partnering with critical third parties to improve their security risk management practices helps promote transparency and collaboration.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2 style="font-weight: normal;"&gt;Avoid one-size-fits-all analysis&lt;/h2&gt; 
&lt;p&gt;ReversingLabs' Jones said that, far too often, organizations make the mistake of building a one-size-fits-all all program to monitor third-party security risk.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Although this may make it easy to compare the security posture of one-third party to another — an apples-to-apples comparison — it overlooks the uniqueness of the relationship, product, or service that is provided that contributes to its risk profile.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Charles Jones&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Jones said one-size-fits-all programs could be detrimental to the comparison of the security maturity of two third parties that are inherently different because "it may negatively influence procurement decisions if the comparison is built off a correlation with no significance."&lt;/p&gt; 
&lt;p&gt;Gopi Ramamoorthy, senior director of security and of governance, risk, and compliance (GRC) at Symmetry Systems, said one way to avoid the one-size-fits-all trap is to implement a tiered system for assessing risk.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The tier levels should depend on multiple metrics, including business dependency, impact, failure risk factors, recovery tests, technical support, and contractual obligations."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/gopi-r/"&gt;Gopi Ramamoorthy&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Once a matured tier-level system is implemented and each third party has been assigned to an appropriate tier, the organization should align the processes and use appropriate system tools to monitor them, Ramamoorthy said. “This will lead to better assessment and visibility of third-party risks and eventually will have improved results in TPCRM,” he added.&lt;/p&gt; 
&lt;h2&gt;Visibility of risk is essential&lt;/h2&gt; 
&lt;p&gt;Visibility is a top-of-mind concern among GRC, IT, and security pros, according to survey results recently released by Drata, a TPCRM company. In its &lt;a href="https://drata.com/resources/risk-trends"&gt;&lt;span&gt;Risk Trends Report&lt;/span&gt;&lt;/a&gt;, Drata found that 80% of businesses are concerned that&amp;nbsp;they don’t have full visibility into the security posture of their third-party partners. Even among businesses that have the resources for thorough third-party screening, 47% acknowledged that they don’t have complete visibility into their third-party ecosystem.&lt;/p&gt; 
&lt;h2&gt;AI to the rescue?&lt;/h2&gt; 
&lt;p&gt;Organizations looking for a better return on their investment may find it as artificial intelligence begins to be integrated into third-party cybersecurity risk management solutions, said Piyush Pandey, CEO of Pathlock.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“AI can dramatically enhance the ROI in third-party risk management by automating risk assessments, enabling the rapid analysis of vast datasets to identify risks efficiently."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/piyush-pandey-0a9599/"&gt;Piyush Pandey&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Organizations should look to solutions that provide continuous, real-time monitoring of third-party activities, providing immediate alerts, as well as dynamic access controls, to mitigate potential issues, Pandey said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“AI should be harnessed to provide predictive analytics capabilities that allow organizations to mitigate potential risks proactively, rather than merely reacting to them, thus optimizing resource allocation and risk mitigation strategies.”&lt;br&gt;—Piyush Pandey&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Panorays' Ben-Ari said AI-powered natural language processing (NLP) can help organizations quickly identify relevant terms related to security, compliance, and responsibilities during due diligence.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“By automating routine tasks, customizing risk scoring, and continuously learning from data, AI optimizes resource allocation, enhances incident response capabilities, and ultimately improves the long-term effectiveness of third-party risk management efforts. This advanced approach ensures that TPCRM efforts are not only compliant but also aligned with business objectives, delivering a more significant return on investment.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Demi Ben-Ari&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Getting a handle on risk is essential to the business&lt;/h2&gt; 
&lt;p&gt;As third parties become increasingly integral to business operations, reducing their risks grows ever more critical. Organizations still have work to do in improving visibility, planning mitigations, and collaborating with partners. &lt;br&gt;&lt;br&gt;By complementing those efforts with AI, companies may finally gain an upper hand on third-party cybersecurity risk and maximize their ROI. The path forward lies in augmenting human intelligence with AI to create more resilient, cyber-aware partnerships.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fkey-reasons-organizations-fail-third-party-risk-management&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Operations</category>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Third-Party Risk Management (TPRM)</category>
      <pubDate>Tue, 02 Jan 2024 14:36:12 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/key-reasons-organizations-fail-third-party-risk-management</guid>
      <dc:date>2024-01-02T14:36:12Z</dc:date>
    </item>
    <item>
      <title>Software supply chain security risks addressed in new Gartner® report</title>
      <link>https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Gartner-Report-ReversingLabs.webp" alt="Software supply chain security risks addressed in new Gartner® report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;Concern about protecting software supply chains has grown significantly over the past few years. Costly software supply chain attacks, including SolarWinds, 3CX, and Log4Shell, garnered headlines internationally and focused the attention of governments and the private sector on software supply chain risk.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Gartner-Report-ReversingLabs.webp?width=1400&amp;amp;height=732&amp;amp;name=Gartner-Report-ReversingLabs.webp" width="1400" height="732" alt="Gartner Report ReversingLabs" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;Concern about protecting software supply chains has grown significantly over the past few years. Costly software supply chain attacks, including SolarWinds, 3CX, and Log4Shell, garnered headlines internationally and focused the attention of governments and the private sector on software supply chain risk.&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;And for good reason. According to the research firm Gartner, almost two-thirds (61%) of all U.S. businesses were directly impacted by software supply chain attacks between April 2022 and April 2023. In the United States, software supply chain security takes center stage in federal efforts to strengthen cybersecurity. Since issuing its initial &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;&lt;span&gt;Executive Order 14028&lt;/span&gt;&lt;/a&gt; in May, 2021, the Biden administration followed up with policy directives and guidance — many focused on improving software supply chain transparency and security.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;More recently, Gartner released the report “&lt;a href="https://www.reversinglabs.com/gartner-report-mitigate-enterprise-software-supply-chain-security-risks"&gt;&lt;span&gt;Mitigate Enterprise Software Supply Chain Security Risks&lt;/span&gt;&lt;/a&gt;” in October, which provides guidance to private-sector companies on how to manage their software supply chain risk. Based on the findings of research conducted by the firm, Gartner makes recommendations for both software publishers and for those who manage vendor application security, so that their organizations can &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-security-compliance-get-out-front"&gt;stay ahead of software supply chain risks&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Here are three key takeaways from Gartner’s report.&lt;br&gt;&lt;br&gt;&lt;span style="color: #000000; font-weight: bold;"&gt;[ Get Gartner report: &lt;span style="color: #ff0201;"&gt;Mitigate Enterprise Software Supply Chain Security Risks&lt;/span&gt; | Join the related Webinar: &lt;a href="https://www.reversinglabs.com/webinar/takeaways-from-gartner-software-supply-chain-report"&gt;Discuss Key Takeaways from the Gartner report&lt;/a&gt; ]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Supply chain security is a third-party risk priority&lt;/h2&gt; 
&lt;p&gt;Most organizations today are using third parties to fulfill their IT needs – and that includes companies that are in the business of making software. Digital transformation and the embrace of cloud computing and SaaS (software as a service) make third-party risk management (TPRM) critical to maintaining operational integrity across industries. But what counts as TPRM is changing.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“TPRM vendors … do not provide adequate information to form a complete opinion of the risk that a vendor might pose. A superior approach to managing risk is to directly request and evaluate attestations — or other evidence — of appropriate secure software development practices."&lt;/em&gt;&lt;br&gt;&lt;em&gt;–Gartner&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;For organizations to have robust TPRM that accounts for software supply chain security, Gartner recommends that they request and evaluate attestations of secure software development practices from any third-party vendor. Vendors that cannot — or will not — provide this attestation should be approached with caution and even disqualified from consideration.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Frameworks such as the National Institute of Standards and Technology’s &lt;a href="https://www.reversinglabs.com/glossary/secure-software-development-framework-ssdf"&gt;secure software development framework (SSDF)&lt;/a&gt; provide guidance on how organizations should prioritize software supply chain security. That includes protecting software from malicious actions, developing software securely, and responding to vulnerabilities.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Transparency is a must-have&lt;/h2&gt; 
&lt;p&gt;Modern software products consist of proprietary, commercial, and open-source code. Risks to software supply chain security, such as the exploitation of software vulnerabilities or tampering with an organization’s build and release processes, can exist in any type of application, no matter the mix of first-, second-, or third-party code.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;That complex mixture prompted calls from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) for greater supply chain transparency, so that development organizations can identify risks in the software they are creating, ranging from software vulnerabilities to legal risks to technical debt. The best way to provide this transparency is with a high-quality &lt;a href="https://www.reversinglabs.com/glossary/software-bill-of-materials-sbom"&gt;&lt;span&gt;software bill of materials (SBOM)&lt;/span&gt;&lt;/a&gt;, which serves as a comprehensive ingredients list for software components.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The inability or unwillingness of a vendor to provide an SBOM should be viewed as a significant risk and potentially disqualifying.” &lt;/em&gt;&lt;br&gt;&lt;em&gt;—Gartner&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Consider new tooling to detect malware in code&lt;/h2&gt; 
&lt;p&gt;As incidents such as SolarWinds and 3CX show us, both software producers and consumers need to be able to identify malware and malicious code hiding within software products.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Malicious code can make its way into software in several ways. Developers may fall prey to typosquatting attacks and will accidentally employ a malicious package from an open-source repository as a part of their non-malicious application. In more extreme cases, sophisticated malicious actors infiltrate developer accounts and development organizations, using that access to compromise development and build pipelines in order to tamper with internal code to add malicious features. That tampered code is then compiled, signed, and pushed to customers as sanctioned software updates.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“It is increasingly common for software (both open source and commercial) to be exploited by attackers as an attack vector.” &lt;/em&gt;&lt;br&gt;&lt;em&gt;—Gartner&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Existing application security testing and code analysis tools such as vulnerability scanning, static analysis, and software composition analysis are necessary but insufficient to handle software dependency risks or compromises of development and build pipelines. Gartner’s report highlights this: “Traditional application security testing tools do not typically attempt to detect malicious code.”&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;In addition to pinpointing this gap in traditional AppSec tooling, the Gartner report states, “There are a limited number of vendors who can support automated analysis of code to detect malware.”&lt;/p&gt; 
&lt;p&gt;Gartner mentions ReversingLabs as one of those vendors. We agree that in order to detect these kinds of threats, organizations need automated analysis tools that address first-, second-, and third-party code to identify malware and other signs of tampering in source code or compiled binaries.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Enterprises need to stay ahead of threat actors&lt;/h2&gt; 
&lt;p&gt;Gartner’s recommendations listed in its “Mitigate Enterprise Software Supply Chain Security Risks” report are reflective of the growing need to secure software supply chains from modern-day attacks. As recent incidents show, both cybercriminal and nation-state threat actors are becoming more skilled in how they carry out software supply chain attacks. As such attacks proliferate, it raises the bar on the federal government, open-source communities, and enterprises to increase their scrutiny of supply chain risks and take action to prioritize software supply chain security protections.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Read the complete Gartner® report, “&lt;a href="https://www.reversinglabs.com/gartner-report-mitigate-enterprise-software-supply-chain-security-risks"&gt;Mitigate Enterprise Software Supply Chain Security Risks&lt;/a&gt;”.&lt;/p&gt;  
&lt;p style="font-size: 16px;"&gt;&lt;em&gt;Gartner, Mitigate Enterprise Software Supply Chain Security Risks By Dale Gardner, 31 October 2023&lt;/em&gt;&lt;/p&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;em&gt;Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;em&gt;Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fsoftware-supply-chain-risks-addressed-in-new-gartner-report&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Mon, 01 Jan 2024 18:30:00 GMT</pubDate>
      <author>carolynn.vanarsdale@reversinglabs.com (Carolynn van Arsdale)</author>
      <guid>https://www.reversinglabs.com/blog/software-supply-chain-risks-addressed-in-new-gartner-report</guid>
      <dc:date>2024-01-01T18:30:00Z</dc:date>
    </item>
    <item>
      <title>The JetBrains TeamCity software supply chain attack: Lessons learned</title>
      <link>https://www.reversinglabs.com/blog/jetbrains-teamcity-software-supply-chain-attack-a-sunburt-redux</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/jetbrains-teamcity-software-supply-chain-attack-a-sunburt-redux" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/pipeline-jetbrains-teamcity-breach.jpg" alt="The JetBrains TeamCity software supply chain attack: Lessons learned" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;The group that perpetrated the notorious SunBurst attack on SolarWinds in 2020 is actively exploiting a vulnerability in JetBrains TeamCity's continuous integration/continuous delivery (CI/CD) software, which is used by development teams to manage and automate compilation, building, testing, and releasing software.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/pipeline-jetbrains-teamcity-breach.jpg?width=1400&amp;amp;height=732&amp;amp;name=pipeline-jetbrains-teamcity-breach.jpg" width="1400" height="732" alt="pipeline-jetbrains-teamcity-breach" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;The group that perpetrated the notorious SunBurst attack on SolarWinds in 2020 is actively exploiting a vulnerability in JetBrains TeamCity's continuous integration/continuous delivery (CI/CD) software, which is used by development teams to manage and automate compilation, building, testing, and releasing software.&lt;/p&gt;  
&lt;p&gt;The Cybersecurity&lt;span&gt; &lt;/span&gt;and Infrastructure Security Agency (CISA) &lt;a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a"&gt;warned in an &lt;span&gt;alert&lt;/span&gt; released on Dec. 13&lt;/a&gt;:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"If compromised, access to a TeamCity server would provide malicious actors with access to that software developer’s source code, signing certificates, and the ability to subvert software compilation and deployment processes — access a malicious actor could further use to conduct supply chain operations."&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;A patch for the vulnerability — CVE-2023-42793 — has been available since September, but as of December, only 2% of TeamCity instances have installed it. It's estimated that more than 30,000 JetBrains customers use TeamCity servers, of which more than 3,000 on-premises servers were exposed to the Internet when the vulnerability was discovered.&lt;/p&gt; 
&lt;p&gt;Some have said the incident &lt;a href="https://www.scmagazine.com/news/echoes-of-solarwinds-jetbrains-teamcity-servers-under-attack-by-russia-backed-hackers"&gt;has echoes of the SunBurst attack&lt;/a&gt;,&lt;a href="https://www.scmagazine.com/news/echoes-of-solarwinds-jetbrains-teamcity-servers-under-attack-by-russia-backed-hackers"&gt; &lt;/a&gt;which involved Russian Foreign Intelligence Service (SVR) cyber-actors using &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;stealthy access to SolarWinds to compromise the company and its customers&lt;/a&gt;. That doesn't seem to be the case with the TeamCity compromise, CISA noted.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Here are the key lessons for your development and application security (AppSec) teams.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;[ Get the new report:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;&lt;span&gt;&amp;nbsp;| Join the conversation:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;Webinar: State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;&lt;/a&gt;&lt;span&gt;&amp;nbsp;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;The same old tools are used for old tricks&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The backdoor installed by the Kremlin crew is called GraphicalProton. Andrew Barratt, managing principal for solutions and investigations at Coalfire, said it's a piece of malware with a fairly interesting command-and-control method, using typically known and trusted services such as OneDrive.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“It can establish outbound exfiltration channels that are then polled by the threat actor to retrieve data, or for them to send instructions. As they're using known, good services, they typically get through even a well-configured firewall.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/andrewbarratt/"&gt;Andrew Barratt&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Balasz Greksza, threat response lead at Ontinue, said that in some of the TeamCity breaches, a vulnerability was exploited in Zabbix, a popular open-source tool for monitoring the status and performance of various IT components and networks, much like SolarWinds’ Orion software.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The vulnerability in Zabbix allowed GraphicalProton to be distributed via DLL hijacking of a legitimate Zabbix DLL. The malware distribution method is similar to the SolarWinds style of attack.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/bgreksza/"&gt;Balasz Greksza&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Roger Grimes, a defense evangelist with KnowBe4, said another trademark tool of the SVR is being used in the JetBrains TeamCity attacks: Mimikatz, &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;a free tool created over a decade ago by a single person to demonstrate how easy it is to enumerate Windows passwords and Windows password hashes if the hacker can get on a Windows computer with elevated privileges.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“During the heady ‘pass-the-hash’ days, when those attacks were what people were worrying about instead of ransomware, Mimikatz became the go-to hacking tool for any hacker hacking Windows computers and networks. It is still very popular, often being integrated into other popular hacking tools.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/rogeragrimes/"&gt;Roger Grimes&lt;/a&gt;&lt;/em&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Microsoft has many defenses that significantly diminish what Mimikatz can do on a Windows computer or network, but those defenses can cause operational issues in some environments and for that reason aren't enabled by default, Grimes said. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-size: 24px;"&gt;“And unfortunately, when you don't make a security setting a default, most users won't do it.”&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 24px;"&gt;—Roger Grimes&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Lessons learned in the new era of supply chain security&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The JetBrains TeamCity attacks can teach security teams some important lessons, said Ashlee Benge, director of threat intelligence at ReversingLabs. She said it's time for a new generation of tools that can go beyond legacy application security testing, as recommended &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;by the &lt;/a&gt;&lt;span&gt;&lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds"&gt;Enduring Security Framework (ESF) working group most recently in its newest supply chain security guidance&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;“For both developers and consumers of software, it's extremely important to thoroughly scan the final compiled binary prior to deployment. If a developer's build system has been compromised, scanning source code prior to build is not enough. &lt;/span&gt;&lt;/em&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;There are many AppSec tools out there, but very few that analyze compiled binaries."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/ashleebenge/"&gt;Ashlee Benge&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Benge said &lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;complex binary analysis&lt;/a&gt;, &lt;span&gt;a new security tool category referred to broadly as software supply chain security, is one that both developers and consumers should be looking into&lt;/span&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Barratt said that AppSec practices must be built into your team's day-to-day security operations.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Automate the routine security validation with SAST and DAST products and make the most of your offensive security partner to look for weaknesses in your applications that could be exploited for monetary gain. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;An attacker might not always target your data, but they almost certainly will target the applications you've given access to that data."&lt;br&gt;—Andrew Barratt&lt;br&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Best practices on patching should be followed&lt;/h2&gt; 
&lt;p&gt;The JetBrains TeamCity incident also attests to the value of timely patching. “The TeamCity software vulnerability should have been patched very quickly, to prevent an entry point for intrusion,” Greksza noted. Subsequently, organizations that experienced a breach should have followed up with a rapid and full-scope investigation to prevent a large-scale compromise, he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Exposing key resources to the public Internet such as TeamCity servers without additional segregations or limitations in place increases the attack surface and likelihood of a successful compromise.”&lt;br&gt;—Balasz Greksza&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Developers are also in the hot seat&lt;/h2&gt; 
&lt;p&gt;Developers can never be too careful about validating their code, Grimes said. Hackers have long broken into coding development environments and inserted malicious code or instructions. "It happens all the time,” he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;“All development environments must mitigate this risk by having secure coding repositories, super secure coding workstations, code signing, and frequent code review to make sure nothing untoward has been inserted in the code.”&lt;br&gt;—Roger Grimes&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;Take action on software supply chain security now&lt;/h2&gt; 
&lt;p&gt;CISA's advisory noted that the attacks have so far been limited in number, with access used to escalate privileges, move laterally, deploy backdoors, and take other steps to ensure persistent and long-term access to the compromised network environments. "&lt;span&gt;The authoring agencies are not currently aware of any other initial access vector to JetBrains TeamCity currently being exploited by the SVR," CISA noted.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;But that should not lead to complacency, ReversingLabs' Benge stressed.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 20px;"&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;“T&lt;i&gt;eamCity is not the first CI/CD tool that's been breached. We've seen this with the CircleCI breach and a similar compromise of 3CX, both earlier this year. And it won't be the last&lt;/i&gt;.”&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 24px;"&gt;—Ashlee Benge&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fjetbrains-teamcity-software-supply-chain-attack-a-sunburt-redux&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 21 Dec 2023 16:13:12 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/jetbrains-teamcity-software-supply-chain-attack-a-sunburt-redux</guid>
      <dc:date>2023-12-21T16:13:12Z</dc:date>
    </item>
    <item>
      <title>ESF steps up supply chain security guidance with call for binary analysis</title>
      <link>https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/gartner-mitigate-software-supply-chain-risk-malware.jpg" alt="ESF steps up supply chain security guidance with call for binary analysis" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #191918; background-color: white;"&gt;&lt;br&gt;One of the more significant aspects of a new document &lt;span style="color: #191918; background-color: white;"&gt;on software supply chain security &lt;/span&gt;from the Enduring Security Framework (ESF) is the &lt;span style="color: #191918; background-color: white;"&gt;recommendation&lt;/span&gt;&amp;nbsp;of binary analysis and reproducible builds as best practices.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;span style="color: #191918; background-color: white;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/gartner-mitigate-software-supply-chain-risk-malware.jpg?width=1400&amp;amp;height=732&amp;amp;name=gartner-mitigate-software-supply-chain-risk-malware.jpg" width="1400" height="732" alt="gartner-mitigate-software-supply-chain-risk-malware" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;One of the more significant aspects of a new document &lt;span style="color: #191918; background-color: white;"&gt;on software supply chain security &lt;/span&gt;from the Enduring Security Framework (ESF) is the &lt;span style="color: #191918; background-color: white;"&gt;recommendation&lt;/span&gt;&amp;nbsp;of binary analysis and reproducible builds as best practices.&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;The document, titled "&lt;a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3613105/nsa-and-esf-partners-release-recommended-practices-for-managing-open-source-sof/"&gt;Securing the Software Supply Chain: Recommended Practices for Managing Open-Source Software and Software Bill of Materials,&lt;/a&gt;" builds on previous efforts by the U.S. federal government to foster formal standards for bolstering software security against current and emergent threats, including the &lt;a href="https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign"&gt;most recent push for Secure by Design&lt;/a&gt;, which seeks to shift liability for software compromises to software teams.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;Developed by the ESF, a public-private working group led by the National Security Agency and the &lt;span&gt;Cybersecurity and Infrastructure Security Agency&lt;/span&gt;, the new guidelines focus heavily on practices for ensuring the security of open-source components in enterprise software. But within the &lt;/span&gt;&lt;span style="color: #191918; background-color: white;"&gt;document, the ESF goes a step further, calling for application security tools that go beyond legacy testing by using &lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;complex binary analysis&lt;/a&gt;, as well as employing &lt;a href="https://en.wikipedia.org/wiki/Reproducible_builds"&gt;reproducible builds&lt;/a&gt;.&lt;/span&gt;&lt;strong&gt;&lt;span style="color: #191918; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Here's what software producers and consumers need to know about the recommendations in the new guidelines.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;[ See ReversingGlass: &lt;a href="https://www.reversinglabs.com/reversingglass/esf-calls-for-software-package-final-exams"&gt;Why binary analysis matters&lt;/a&gt; | Learn more: &lt;a href="https://www.reversinglabs.com/blog/the-power-of-complex-binary-analysis"&gt;The Power of Complex Binary Analysis&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/the-monsters-in-your-software-supply-chain"&gt;&lt;/a&gt; ]&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #191918; background-color: white;"&gt;A significant call to action on supply chain security&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;&lt;span style="color: #191918; background-color: white;"&gt;The ESF document recommends that developers and third-party software suppliers perform binary analysis as a final package verification step:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Before shipping the software package to customers, the developer or supplier should perform binary composition analysis to verify the contents of the package and reproducible build validation when possible."&lt;/span&gt;&lt;/em&gt;&lt;span style="color: #191918; background-color: white;"&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;Such binary analysis tools can determine what is included in the final deliverables "and identify potential issues in the final packages, [including] a range of activities from the detection of potential vulnerabilities and threats to including Software of Unknown Provenance (SOUP) and secrets inadvertently included in the final packages."&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;Significantly, the ESF document recommended that binary code analysis practices be applied not just to software vendors, but also to the phases of software acquisition, deployment, and operations. &lt;/span&gt;&lt;span style="color: #191918; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;In addition, the ESF recommends that &lt;a href="https://www.reversinglabs.com/blog/to-secure-your-ci/cd-pipelines-round-up-the-usual-suspects"&gt;software developers use reproducible builds&lt;/a&gt;, when possible, to ensure that code in a package has not been tampered with or modified.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #191918; background-color: white;"&gt;To mitigate risk, go beyond legacy AppSec&lt;/span&gt;&lt;span style="color: #191918; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;Security experts consider both binary analysis and reproducible builds crucial components of supply chain security. The goal with binary code analysis is to inspect the binaries in a finished software package for potential security issues to validate configuration and code provenance and look for hidden functionality and undocumented features such as backdoors. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;Binary analysis enables visibility into code that runs in production and can be especially useful when an organization does not have access to a particular software package's source code, as is almost aways the case when purchasing commercial products.&lt;/span&gt;&lt;span style="color: #191918; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #191918; background-color: white;"&gt;&lt;span style="color: #191918; background-color: white;"&gt;Meanwhile, a reproducible build is an additional step to ensure the software that an organization develops or acquires from a developer or commercial supplier behaves the same when run in parallel, which can expose things such as tampering or malware that has entered the package through the software supply chain.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Binary analysis bolsters SBOMs&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;John Gallagher, vice president at enterprise security platform Viako, said t&lt;/span&gt;&lt;span style="color: #222222;"&gt;he inclusion of these practices is a significant step forward in software supply chain security. Binary analysis and reproducible builds can enable more trust in using software bills of materials (SBOMs), he said.&lt;br&gt;&lt;br&gt;Binary analysis adds to current source code analysis methods by providing detailed information on dependencies and security risks, both of which are critically important.&lt;/span&gt;&lt;span style="color: #222222;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Generating an SBOM based on binary code analysis can catch transitive dependencies that can lead to security and privacy issues compared to generating an SBOM through source code analysis. The implicit 'trust' for an SBOM is the ability to use it for catching vulnerabilities, and a combination of source code analysis and binary code analysis will provide a more 'trusted' SBOM."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/b2bpipelinebuilder/"&gt;John Gallagher&lt;/a&gt;&lt;/em&gt;&lt;a href="https://www.linkedin.com/in/b2bpipelinebuilder/"&gt;&lt;span style="background-color: transparent; color: #222222;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Recommending binary analysis will also likely advance the &lt;a href="https://www.reversinglabs.com/blog/sbom-critical-but-first-step-software-supply-chain-security"&gt;use of the Vulnerability Exploitability eXchange (VEX) &lt;/a&gt;for managing and tracking application and firmware vulnerabilities, Gallagher said. &lt;/span&gt;&lt;span style="color: #500050; background-color: white;"&gt;&lt;/span&gt;&lt;span style="color: #222222;"&gt;&lt;a href="https://cyclonedx.org/capabilities/vex/"&gt;VEX&lt;/a&gt; is an intermediate representation of binary code that is architecture-agnostic, and when used with platforms such as &lt;a href="https://docs.angr.io/en/latest/core-concepts/toplevel.html"&gt;angr&lt;/a&gt;, can make program analysis easier, he said. &lt;/span&gt;&lt;span style="color: #222222;"&gt;"In other words, VEX offers a level of abstraction for easier binary analysis." &lt;/span&gt;&lt;span style="color: #1c1917;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;Enter the new era of software supply chain security&lt;/h2&gt; 
&lt;p&gt;Matt Rose, field CISO at ReversingLabs, said the inclusion of binary code analysis as a recommended best practice reflects a broader and ongoing formalization of the definition of software supply chain security that's been happening over the last couple of years.&lt;/p&gt; 
&lt;p&gt;Following the Biden administration's May 2021 &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;Executive Order on Improving the Nation’s Cybersecurity,&lt;/a&gt; which specifically &lt;a href="https://www.reversinglabs.com/blog/white-house-memo-lays-down-the-law-on-software-supply-chain-security"&gt;called out the need to enhance security of software supply chains&lt;/a&gt;, there has been an evolving understanding of what exactly that entails, Rose said.&lt;/p&gt; 
&lt;p&gt;Increasingly, there is recognition of the need for organizations to have mechanisms to assess the security of commercial third-party software they consume that go beyond SBOMs, which are little more than &lt;a href="https://www.reversinglabs.com/blog/sbom-facts-know-whats-in-software-fend-off-supply-chain-attacks"&gt;a list of ingredients in software&lt;/a&gt;. SBOMs don't give organizations visibility into the security posture of the package itself, Rose said.&lt;/p&gt; 
&lt;p&gt;Binary code analysis can help organizations evaluate and verify the security of not just internally developed software, but also third-party commercial software in their environment, before it is released.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="font-weight: normal;"&gt;"&lt;/span&gt;It is the final examination of a package for software supply chain risk, which allows for trust in that piece of software that you are either developing for your customers or that you are buying to help operate your business."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;S&lt;span style="color: #1f1f1f;"&gt;aša Zdjelar, Chief Trust Officer at ReversingLabs, said t&lt;/span&gt;he recommended use of binary analysis and reproducible builds marked a significant step forward in ensuring better software supply chain security&lt;span style="color: #1f1f1f;"&gt;. AppSec practices such as SAST and DAST typically only apply to a small subset of internally developed systems and applications at many organizations, he said.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1f1f1f;"&gt;Legacy application security testing is out of sync with modern software development because it does not cover software developed by commercial providers and other third parties. &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #1f1f1f;"&gt;"&lt;/span&gt;Our ability to analyze binaries is key to understanding risk in third party software."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;/em&gt;&lt;a href="https://www.linkedin.com/in/sasazdjelar/" style="font-style: italic;"&gt;Saša Zdjelar&lt;/a&gt;&amp;nbsp;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #1f1f1f;"&gt;Modern supply chain security needs accountability&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #1f1f1f;"&gt;A lot of the success of software supply chain security programs depends on where the accountability for implementing the recommended practices rests, Zdjelar said. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1f1f1f;"&gt;Putting the onus on software suppliers alone to do such testing, for example, is unlikely to bolster trust, Zdjelar said. The ESF document recommends that the developer or supplier should perform binary analysis before releasing the package. But it's unclear how much confidence consumers will have in the results of vendor-performed analysis. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1f1f1f;"&gt;Until the software industry gets to that space, binary analysis needs to be part of the software acquisition process as well. And companies seeking to manage software risk need tools that can verify all software being developed or run across their organizations.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"When you buy your car, do you feel the need to do your own crash testing, or do you believe the crashworthiness, the seatbelts, and airbags and crumple zones all work as intended? Generally, we all believe they work as intended because the automobile industry has over time earned our trust in that space."&lt;/em&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;—S&lt;span style="color: #1f1f1f;"&gt;aša Zdjelar&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;span style="background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fesf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Wed, 20 Dec 2023 16:12:00 GMT</pubDate>
      <author>jaikumar.vijayan@gmail.com (Jaikumar Vijayan)</author>
      <guid>https://www.reversinglabs.com/blog/esf-steps-up-guidance-with-call-for-binary-analysis-reproducible-builds</guid>
      <dc:date>2023-12-20T16:12:00Z</dc:date>
    </item>
    <item>
      <title>Malware leveraging public infrastructure like GitHub on the rise</title>
      <link>https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Blog-Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise.webp" alt="Malware leveraging public infrastructure like GitHub on the rise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;/h2&gt; 
&lt;p&gt;The use of public services as command-and-control (C2) infrastructure isn’t a revolutionary technique for malicious actors. ReversingLabs has observed such behavior in several malware campaigns throughout the last few years.&lt;/p&gt; 
&lt;p&gt;Malware authors occasionally place their samples in services like Dropbox, Google Drive, OneDrive and Discord to host second stage malware and sidestep detection tools. However, the ReversingLabs threat research team has recently observed the increasing use of the GitHub open source development platform for hosting malware.&amp;nbsp;&lt;br&gt;&lt;br&gt;Here are two novel techniques deployed on GitHub that were discovered by ReversingLabs. The first abuses GitHub Gists, and the second issues commands through git commit messages.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise.webp?width=1400&amp;amp;height=732&amp;amp;name=Blog-Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise.webp" width="1400" height="732" alt="Malware leveraging public infrastructure like GitHub on the rise" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/h2&gt; 
&lt;p&gt;The use of public services as command-and-control (C2) infrastructure isn’t a revolutionary technique for malicious actors. ReversingLabs has observed such behavior in several malware campaigns throughout the last few years.&lt;/p&gt; 
&lt;p&gt;Malware authors occasionally place their samples in services like Dropbox, Google Drive, OneDrive and Discord to host second stage malware and sidestep detection tools. However, the ReversingLabs threat research team has recently observed the increasing use of the GitHub open source development platform for hosting malware.&amp;nbsp;&lt;br&gt;&lt;br&gt;Here are two novel techniques deployed on GitHub that were discovered by ReversingLabs. The first abuses GitHub Gists, and the second issues commands through git commit messages.&lt;/p&gt;  
&lt;h2&gt;Public services as C2 infrastructure&lt;/h2&gt; 
&lt;p&gt;In one of our previous research team posts, we described &lt;a href="https://www.reversinglabs.com/blog/threat-analysis-malicious-npm-package-mimicks-material-tailwind-css-tool"&gt;a malicious npm package masquerading as the Material Tailwind CSS tool&lt;/a&gt;. The malware used Google Drive, Microsoft OneDrive and GitHub to fetch the address of the real C2 server. This is historically the most common use case of public services being used for malicious purposes: fetching of the real C2 address.&amp;nbsp;&lt;br&gt;&lt;br&gt;However, several families of infostealers published to open source package repositories have also been seen using Dropbox and Discord services to host two stage malware instead of just the location of the real C2 server. Versions of W4SP and similar token stealers, which are typically used as the second stage for downloader PyPI packages, were hosted on GitHub and (more commonly) as Discord attachments. The same approach has been observed in the &lt;a href="https://www.reversinglabs.com/blog/fake-roblox-api-packages-luna-grabber-npm"&gt;fake Roblox NPM packages we observed delivering the LunaGrabber malware&lt;/a&gt;. With the recent &lt;a href="https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole"&gt;IAmReboot&lt;/a&gt; campaign the ReversingLabs threat research team documented, the distributed malicious NuGet downloaders also hosts a second stage, obfuscating a version of the SeroXen RAT on a GitHub repository. &amp;nbsp;&amp;nbsp;&lt;br&gt;&lt;br&gt;There are several reasons why malware authors decide to use public services as C2 infrastructure. The first is that network communication of the infected host with such services is less likely to raise suspicion than communication to an obscure domain or IP address. This is especially true, because &lt;a href="https://www.reversinglabs.com/blog/5-reasons-why-cyber-attackers-love-developers"&gt;developers are becoming a primary target for software supply chain attacks&lt;/a&gt;. In a perfect world, there’s nothing suspicious about a developer’s computer communicating with a GitHub repository. However, in light of these attacks, organizations can’t assume that such traffic is benign.&lt;br&gt;&lt;br&gt;Also, standing up and running C2 infrastructure on platforms like GitHub is simpler than cybercriminals operating their own server. By using public services, the attacker needs only to create an account to access the service, and then publish the desired content to their repository. It falls to the service itself to manage communications and ensure uptime and so on. This eliminates the time and money malware authors need to spend on the maintenance of their attack infrastructure.&lt;/p&gt; 
&lt;h2&gt;Malware (ab)using GitHub Gists&lt;/h2&gt; 
&lt;p&gt;Two interesting malware types using GitHub features have recently been detected during our threat research activities, which the team performs using the &lt;a href="https://www.reversinglabs.com/solutions/protect-against-software-supply-chain-attacks"&gt;ReversingLabs Software Supply Chain Security&lt;/a&gt; platform. The first one used GitHub Gists for hosting two-stage malicious payloads.&amp;nbsp;&lt;br&gt;&lt;br&gt;Gists are a GitHub feature that provides a simple way to share code snippets with other developers, and can be public or secret. As described in Gists &lt;a href="https://docs.github.com/en/get-started/writing-on-github/editing-and-sharing-content-with-gists/creating-gists"&gt;documentation&lt;/a&gt;: “&lt;span style="font-style: italic;"&gt;Secret gists don't show up in Discover and are not searchable unless you are logged in and are the author of the secret gist. Secret gists aren't private. If you send the URL of a secret gist to a friend, they'll be able to see it.&lt;/span&gt;” Another nice characteristic of secret Gists is that they don’t end up being visible in the GitHub profile page of the author. From an attacker's perspective, this makes them usable as a kind of a pastebin service which doesn’t raise much suspicion.&lt;br&gt;&lt;br&gt;In this incident, several PyPI packages presented themselves as libraries for handling network proxying, and contained a Base64 encoded string, allegedly related to telemetry data, but actually containing a URL, pointing to a secret Gist. Malware authors used Base64 encoding to obfuscate the true purpose of this string and make it harder for security tools to detect it as suspicious. Base64 encoding is often used to encode some binary data before it gets transferred over the network. Nevertheless, an experienced eye will quickly recognize that the first few characters of this concrete string get decoded to “http” — almost surely the beginning of an URL, and therefore a red flag for a threat analyst.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-01.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-01.webp?width=1400&amp;amp;name=Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-01.webp" alt="Fetching and executing commands from a Base64 encoded URL" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 1: Fetching and executing commands from a Base64 encoded URL&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;The malicious code was hidden in the &lt;span style="font-style: italic;"&gt;setup.py&lt;/span&gt; file. It was implemented by &lt;a href="https://setuptools.pypa.io/en/latest/userguide/extension.html"&gt;extending setuptools commands&lt;/a&gt;, specifically the &lt;span style="font-style: italic;"&gt;egg_info&lt;/span&gt; command. The code inside &lt;span style="font-style: italic;"&gt;PostEggInfoCommand&lt;/span&gt; visible in Figure 1 decodes a Base64 encoded URL from which it also fetches Base64 encoded Python commands that are executed in a new process.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-02.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-02.webp?width=1400&amp;amp;name=Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-02.webp" alt="Extending setuptools commands in setup.py" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 2: Extending setuptools commands in setup.py&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;The interesting part about this malware sample is the decoded URL, which points to a secret Gist belonging to the user &lt;em&gt;yeremyvalidslov2342&lt;/em&gt; — a throwaway account without any public projects, created the same day as the malicious PyPI package. Using Gists for delivery of malicious commands to infected machines isn’t a frequently seen technique. Google search on this topic doesn’t give many results. Our threat research team was able to find only one mention of such a technique being actively used by malware, in a Trend Micro &lt;a href="https://www.trendmicro.com/en_th/research/19/c/new-slub-backdoor-uses-github-communicates-via-slack.html"&gt;report on SLUB Backdoor from March 2019&lt;/a&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-03.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-03.webp?width=1400&amp;amp;name=Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-03.webp" alt="Secret Gist containing Base64 encoded commands" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 3: Secret Gist containing Base64 encoded commands&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="text-align: left;"&gt;Malware fetching commands from git commit messages&lt;/h2&gt; 
&lt;p&gt;The second interesting malware type the ReversingLabs threat research team discovered is a sample that abuses version control system features and was detected in the &lt;em&gt;easyhttprequest&lt;/em&gt; PyPI package. The malicious code was once again hidden in the &lt;em&gt;setup.py&lt;/em&gt; file and implemented by extending the same &lt;em&gt;egg_info setuptools&lt;/em&gt; command.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;This malicious package is using an original technique for command delivery. After installation on the victim's machine, the malicious code from this package clones a specific git repository from GitHub and checks if the “head” commit of this repository contains a commit message that starts with a specific string. If it does, it strips that magic string and decodes the rest of the Base64 encoded commit message, executing it as a Python command in a new process.&amp;nbsp;&lt;br&gt;&lt;br&gt;However, the code in this form isn’t executing malicious functionality since the name of the variable used for condition validation doesn’t match the name of the variable containing Base64 encoded commit message. It is unclear if the malware author did this on purpose or by mistake. The referenced GitHub repository that is cloned is a fork of a legitimate looking PySocks project. At time of publication of this research, it didn’t yet contain the commit with a malicious commit message.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-05.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-05.webp?width=1400&amp;amp;name=Malware-leveraging-public-infrastructure-like-GitHub-on-the-rise-Figure-05.webp" alt="Fetching and executing commands from a Base64 encoded commit message" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 4: Fetching and executing commands from a Base64 encoded commit message&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;Conclusion&lt;/h2&gt; 
&lt;p&gt;Using GitHub as C2 infrastructure isn't new on its own, but abuse of features like Git Gists and commit messages for command delivery are novel approaches used by malicious actors. We have not previously observed malware using such methods of command delivery, nor are we aware of third-party reports documenting such activity. Also, based on an identical execution technique, similar abuse of uncommon GitHub features, and the impersonation of similar networking utilities — ReversingLabs researchers believe that the same malware author is likely behind both of these campaigns.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Despite these malicious packages being taken down from PyPI, the threat research team expects that more GitHub tricks like these will be seen soon. This is because the malware author behind these incidents is still publishing new malware samples, despite the previous version of malware getting removed from PyPI shortly after.&amp;nbsp;&lt;br&gt;&lt;br&gt;Our discoveries of these novel attack methods serve as yet another reminder hat developers must remain wary of the threats that lie within the open source ecosystem. As attackers are becoming more skilled in their deployment of malware, it is essential that developers and application security teams are able to differentiate between malicious and legitimate packages on these platforms. This is why software producers should utilize modern tooling that employs &lt;a href="https://www.reversinglabs.com/glossary/complex-binary-analysis"&gt;complex binary analysis&lt;/a&gt;, which provides comprehensive software software supply chain security.&lt;/p&gt; 
&lt;h2&gt;Indicators of Compromise (IOCs)&lt;/h2&gt; 
&lt;p&gt;Indicators of Compromise (IoCs) refer to forensic artifacts or evidence related to a security breach or unauthorized activity on a computer network or system. IOCs play a crucial role in cybersecurity investigations and cyber incident response efforts, helping analysts and cybersecurity professionals identify and detect potential security incidents.&lt;br&gt;&lt;br&gt;The following IOCs were collected as part of ReversingLabs investigation of this software supply chain campaign.&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;PyPI packages:&lt;/h3&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; background-color: #171d38; border: 1px solid #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;package_name&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; background-color: #171d38; border: 1px solid #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;version&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; background-color: #171d38; border: 1px solid #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;SHA1&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;httprequesthub&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;2.31.0&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;fa64041676f22ac3ea55170c6594b5142d3e45ac&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;httprequesthub&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;2.31.1&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;abd752e9603f9714f4e8b6860ad148d4003151a2&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;httprequesthub&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;2.31.3&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;b8e878bb3a47c6ca66e5f962a3e7f92f0a47324f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;httprequesthub&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;2.31.4&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;b39f20452100f2fc3dc27088876ef4c07ede5f36&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;pyhttpproxifier&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;0.9.2&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;eb18768cbe6b74394c46162008a289e0b5e191f0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;pyhttpproxifier&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;0.9.3&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;04f0ffd63368d84ec320cfae5b059eb7431b758f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;easyhttprequest&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;2.31.4&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;8b5de82c0a51bd0e5be225a1ae968c8fad2467bb&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;easyhttprequest&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;2.31.5&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;0058dffe115f5d631a5f0a93a69ef88dc29d2c2d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libsock&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.1.3&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;fd727a37938e9d94d3bc6159bee398a915e74465&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libproxy&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.1.4&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;38e431bfc8496e80e59077efa4a5889763a812fc&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libproxy&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.1.5&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;c1fe2550edd3815f7a72a98dabd4a450419e0592&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libsocks5&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.1.1&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;fa761695087db89316cac5accf6eae332bda4803&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libsocks5&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.7.0&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;e9a42bdeb8da3a460dde3b2c162ed1fd65d07bb0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libsocks5&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.7.1&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;687abd0a47c26c112309bb16238c7cf8238239d9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libsocks5&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.7.3&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;b5e0e89d7d675b6804bdb3a86e1c4609be5d7689&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 25.1749%; padding: 4px; border: 1px solid #afc7d7;"&gt;libsocks5&lt;/td&gt; 
    &lt;td style="width: 16.0268%; padding: 4px; border: 1px solid #afc7d7;"&gt;1.7.4&lt;/td&gt; 
    &lt;td style="width: 58.7983%; padding: 4px; border: 1px solid #afc7d7;"&gt;7f27520be02c490b7b12ad4001bd63fb98245c63&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fmalware-leveraging-public-infrastructure-like-github-on-the-rise&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Research</category>
      <pubDate>Tue, 19 Dec 2023 12:30:00 GMT</pubDate>
      <author>karlo.zanki@reversinglabs.com (Karlo Zanki)</author>
      <guid>https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise</guid>
      <dc:date>2023-12-19T12:30:00Z</dc:date>
    </item>
    <item>
      <title>The Hugging Face API token breach: 5 lessons learned</title>
      <link>https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/api-security-hugging-face-ai.jpg" alt="The Hugging Face API token breach: 5 lessons learned" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;Researchers from &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Lasso Security &lt;/span&gt;&lt;/span&gt;rattled the AI development world early in December when they discovered that more than 1,500 Hugging Face API tokens were exposed, leaving millions of users vulnerable.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/api-security-hugging-face-ai.jpg?width=1400&amp;amp;height=732&amp;amp;name=api-security-hugging-face-ai.jpg" width="1400" height="732" alt="api-security-hugging-face-ai" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;Researchers from &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Lasso Security &lt;/span&gt;&lt;/span&gt;rattled the AI development world early in December when they discovered that more than 1,500 Hugging Face API tokens were exposed, leaving millions of users vulnerable.&lt;/p&gt;  
&lt;p&gt;Hugging Face is the GitHub for AI developers. Its open-source library hosts more than 500,000 AI models and 250,000 datasets, including pre-trained models from Meta-Llama, Bloom, and Pythia.&lt;/p&gt; 
&lt;p&gt;One of the most used features of the website is its API, which allows developers and organizations to integrate models and read, create, modify, and delete repositories or files within them. A compromise of its API could be catastrophic.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Bar Lanyado, a security researcher at Lasso Security, &lt;/span&gt;said in &lt;a href="https://www.lasso.security/blog/1500-huggingface-api-tokens-were-exposed-leaving-millions-of-meta-llama-bloom-and-pythia-users-for-supply-chain-attacks"&gt;his team's analysis of the compromise&lt;/a&gt; that the Hugging Face API tokens are significant for organizations and that exploiting them could lead to major negative outcomes, including data breaches and the spread of malicious models that "could affect millions of users who rely on these foundational models for their applications."&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The gravity of the situation cannot be overstated. With control over an organization boasting millions of downloads, we now possess the capability to manipulate existing models, potentially turning them into malicious entities."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/bar-lanyado-bb50b3110/"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;Bar Lanyado&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;After the disclosure, the repository and its affected users rushed to mitigate the problem, narrowly evading a debacle. Here are five lessons learned from the breach — and some best practices for reality-checking API security in your development environment.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Learn more: &lt;a href="https://www.reversinglabs.com/blog/secure-ai-development-guidance-what-appsec-teams-needs-to-know"&gt;Secure AI development guidance: What software teams need to know&lt;/a&gt; | &lt;a href="https://www.reversinglabs.com/blog/2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security"&gt;MFA and software supply chain security: It's no magic bullet&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;1. Don't store login information in public repositories&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Roger Grimes, a defense evangelist for KnowBe4, said shared logins are&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt; a huge ongoing problem. "After years of telling developers not to store logon information on public repositories, they continue to do so in large numbers," he said.&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;br&gt;&lt;br&gt;Grimes said the big takeaway was that technical defenses are now a requirement.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;&lt;span style="font-size: 24px;"&gt;Studies have shown that when logon information is stored in deposited code, it's only minutes before potential adversaries start to take advantage of it.&lt;/span&gt; &lt;/span&gt;While I'm a huge believer in the power of education to combat most cybersecurity problems, this is one that needs more technical defenses."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/rogeragrimes/"&gt;Roger Grimes&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Public repositories, in an attempt to mitigate the problem, should do proactive scanning when a developer uploads code and block the storing of logon information within stored code — or at least warn the developer of the severe consequences, he said.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;With the severity of a potential breach, repositories such as GitHub have been rushing to two-factor and multifactor authentication (2FA and MFA) &lt;a href="https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa"&gt;to protect accounts&lt;/a&gt;. However, &lt;a href="https://www.reversinglabs.com/blog/2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security"&gt;2FA and MFA are not panaceas&lt;/a&gt;, experts warn.&lt;/p&gt; 
&lt;h2&gt;2. Use multiple API keys — and rotate them&lt;/h2&gt; 
&lt;p&gt;Nick Rago, a field CTO with the API security firm Salt Security, said that it's good security practice to use not just one API key with third-party providers, but many, each focused on certain integration services to minimize impact of an exposed token. It is also a best practice to frequently rotate keys.&lt;/p&gt; 
&lt;p&gt;If a third-party provider only allows public API access with static tokens, it's good to use an API gateway as an intermediary between a developer and the third-party API, Rago said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"That way, the organizations can enforce more robust API posture and authentication methods in their code, such as OAuth or MTLS."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/cybrrnick/"&gt;Nick Rago&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;3. Be aware of third-party API usage&lt;/h2&gt; 
&lt;p&gt;Rago explained that API security is not just about securing APIs that are internally developed; ensuring safe consumption and usage of leveraged third-party APIs is also critical.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"Key business process today consists of API supply chain calls that consist of consumption of both internal and third-party APIs. Therefore, it is important that organizations have a good understanding of what third-party APIs are in use, their function, and the data associated with them to assess risk."&lt;/span&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;—Nick Rago&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Education is also important, because developers need to understand the ramifications of mishandling privileged API keys. And technologies should be in place to ensure that secrets such as static API tokens don't find their way into code and then into exposed repositories, Rago said.&lt;/p&gt; 
&lt;h2&gt;4. Your AI tools need to take data handling seriously&lt;/h2&gt; 
&lt;p&gt;Teresa Rothaar, a governance, risk, and compliance analyst at Keeper Security, said AI development demands the highest security protocols given the amount of sensitive data AI models need to be fed for training to generate accurate and appropriate results. That means AI data sets alone are valuable.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"In addition to the danger of data poisoning — a scenario where threat actors feed AI models inaccurate or inappropriate data — threat actors may seek to steal fully trained AI models that organizations have invested thousands of work hours and millions of dollars into. Why invest your own money and time into building an AI model if you can steal another organization’s work?"&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/teresarothaar/"&gt;Teresa Rothaar&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;5. AI providers need to foster trust in APIs and beyond&lt;/h2&gt; 
&lt;p&gt;Karl Mattson, CISO of API security firm Noname Security, said that as large language models grow in use, they will become embedded into applications using APIs. Organizations are already using generative AI from a variety of vendors and various channels. This utilization is taking different forms, including integrating generative AI into in-house application development, incorporating it into third-party applications, or accessing it directly via API from providers such as OpenAI or Google's Bard, Mattson said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"As API attacks continue to increase on AI, organizations integrating with generative AI technologies may face the same risks and consequences. The AI industry will need to work to maintain trust by building secure API implementations and protecting third-party transactions with good security hygiene.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/karlmattson1/"&gt;Karl Mattson&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;Best practices for securing your APIs&lt;/h2&gt; 
&lt;p&gt;Tushar Kulkarni, a graduate student at Indiana University who was part of a recent an &lt;a href="https://www.rsaconference.com/library/webcast/156-building-breaking-vulnerable-apis"&gt;RSA Conference &lt;span&gt;webcast on API security&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="https://www.rsaconference.com/library/webcast/156-building-breaking-vulnerable-apis"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;shared six measures organizations can take to secure their API implementations.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Don't use GUIDs/UUIDs that can be guessed by a threat actor in an intuitive way.&lt;/strong&gt; GUIDs (globally unique identifiers) and UUIDs (universally unique identifiers) are used as identifiers for various resources or objects in APIs. During the web session, Kulkarni demonstrated how weak identifiers can be used to compromise an API.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Never rely on a client to filter sensitive data.&lt;/strong&gt; It's always a good practice to allow a client to fetch only the data that is needed and nothing more.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Enforce a limit on how often a client can call the API endpoint.&lt;/strong&gt; Without limits, a threat actor can carry out attacks, such as credential stuffing.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Lock down endpoints.&lt;/strong&gt; Make sure all administrative endpoints validate a user's role and privileges before performing an action.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Avoid functions binding client-side data into code variables and later into objects in databases.&lt;/strong&gt; Binding client-side data directly into code variables can expose the API to injection attacks, such as SQL injection or NoSQL injection. It can also expose the API to unintentional code injection vulnerabilities.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Enforce a strong CORS policy with custom, unguessable authorization headers.&lt;/strong&gt; Enforcing a strong CORS policy ensures that only trusted domains are allowed to make requests to the API. That helps mitigate the risk of cross-site request forgery and other cross-origin attacks. "Enforcing a strong CORS policy is very important," Kulkarni said.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Developers should treat all API inputs as dangerous, Kulkarni said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"You should never assume end users won't fool around with the API on their own. You should always assume that every end user is an attacker."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/kulkarnivtushar/"&gt;Tushar Kulkarni&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F5-lessons-learned-from-the-huggingface-api-breach&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 14 Dec 2023 16:00:46 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach</guid>
      <dc:date>2023-12-14T16:00:46Z</dc:date>
    </item>
    <item>
      <title>Secure AI development guidance: What software teams need to know</title>
      <link>https://www.reversinglabs.com/blog/secure-ai-development-guidance-what-appsec-teams-needs-to-know</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/secure-ai-development-guidance-what-appsec-teams-needs-to-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/ai-system-guidance-cisa-ncsa.jpg" alt="Secure AI guidance: What software teams needs to know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;The use of generative AI systems has been spreading like wildfire, and if systems are not developed securely, the blaze could end up burning your organization. To help organizations &lt;span&gt;tackle the problem, t&lt;/span&gt;he United Kingdom's National Cyber Security Centre (NCSC) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently released "&lt;a href="https://www.ncsc.gov.uk/collection/guidelines-secure-ai-system-development"&gt;Guidelines for Secure AI System Development&lt;/a&gt;&lt;span&gt;." In it, they note&lt;/span&gt;:&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/ai-system-guidance-cisa-ncsa.jpg?width=1400&amp;amp;height=732&amp;amp;name=ai-system-guidance-cisa-ncsa.jpg" width="1400" height="732" alt="ai-system-guidance-cisa-ncsa" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;The use of generative AI systems has been spreading like wildfire, and if systems are not developed securely, the blaze could end up burning your organization. To help organizations &lt;span&gt;tackle the problem, t&lt;/span&gt;he United Kingdom's National Cyber Security Centre (NCSC) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently released "&lt;a href="https://www.ncsc.gov.uk/collection/guidelines-secure-ai-system-development"&gt;Guidelines for Secure AI System Development&lt;/a&gt;&lt;span&gt;." In it, they note&lt;/span&gt;:&lt;/p&gt;  
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"AI systems have the potential to bring many benefits to society. However, for the opportunities of AI to be fully realized, it must be developed, deployed, and operated in a secure and responsible way."&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The agencies' guidelines are significant not only because they represent an effort to get ahead of security problems with AI, but also because they've garnered the support of cyber-watchdogs from 16 other nations, including France, Germany, Italy, Japan, Australia, and New Zealand. The guidelines also represent input from 19 AI-centered organizations, including Amazon, Anthropic, Google, IBM, Microsoft, OpenAI, and RAND.&lt;/p&gt; 
&lt;p&gt;Michael Leach, legal compliance manager at Forcepoint, said the guidelines take aim at addressing the primary concern at the heart of AI adoption and use: security. And &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;the timing was critical, with teams now recognizing that security is paramount in all phases of the &lt;a href="https://www.reversinglabs.com/glossary/software-development-life-cycle-sdlc"&gt;software development lifecycle (SDLC)&lt;/a&gt; to ensure that AI is used effectively and safely.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Responsible government cooperation on the secure development, deployment, and operation of AI between countries like the U.S. and U.K. is what I believe most of us have been waiting for before we adopt and readily use current and future AI capabilities as a pioneering technology to move society forward in the right direction."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/michael-leach-5332266/"&gt;Michael Leach&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;With AI now infiltrating almost every organization, it's time to get a handle on AI system security. Here's what your software team needs to know about the new NCSA and CISA guidance.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Learn more: &lt;a href="https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign"&gt;How legacy AppSec is holding back Secure by Design&lt;/a&gt; | See Webinar:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design: Why Trust Matters for Risk Management&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Secure by Design is the first step&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Hitesh Sheth, president and CEO of security firm Vectra AI, said the new guidelines represent a genuine effort to deliver a much-needed global standard on secure AI design,&amp;nbsp; and the &lt;a href="https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon"&gt;CISA's Secure by Design &lt;/a&gt;is a critical building block.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“With AI evolving at an unprecedented rate and businesses increasingly keen to adopt it, it’s vital that developers fully consider the importance of cybersecurity when creating AI systems at the earliest opportunity. Therefore, this Secure by Design approach should be welcomed."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/hitesh-sheth-a0b54349/"&gt;Hitesh Sheth&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The &lt;a href="https://www.cisa.gov/securebydesign"&gt;Secure by Design guidelines&lt;/a&gt; should be used in conjunction with established cybersecurity, risk management, and incident response best practices. Those principles prioritize:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Taking ownership of security outcomes for customers&lt;/li&gt; 
 &lt;li&gt;Embracing radical transparency and accountability&lt;/li&gt; 
 &lt;li&gt;Building organizational structure and leadership so that Secure by Design is a top business priority&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The new AI guidelines acknowledge that following Secure by Design principles requires significant resources throughout a development system’s lifecycle, investment in prioritizing features and mechanisms, and the implementation of tools that protect customers at each layer of the system design and across all stages of the SDLC.&lt;/p&gt; 
&lt;p&gt;But by following the new AI guidelines and Secure by Design, organizations can prevent costly redesigns later — and safeguard customers and their data in the process.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;The importance of transparency&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Sheth said that cooperation will empower developers across the globe to make more informed cybersecurity decisions about AI. “It’s encouraging to see the U.K. and U.S. work hand in hand, and with agencies from 16&amp;nbsp;other countries confirming they will endorse and co-seal the guidelines,” he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Transparency is vital when it comes to AI development, so these guidelines should act as a springboard for the delivery of reliable and secure innovation that can transform how we live and work.”&lt;br&gt;—Hitesh Sheth&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;A key contributor to the transparency will be documentation. The production of comprehensive documentation supports transparency and accountability, the AI guidelines noted.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The guidelines urge AI system developers to document the creation, operation, and lifecycle management of any models, datasets, and meta or system prompts. That documentation should include security-relevant information such as the sources of training data (including fine-tuning data and human or other operational feedback), intended scope and limitations, guardrails, cryptographic hashes or signatures, retention time, suggested review frequency, and potential failure modes.&lt;/p&gt; 
&lt;p&gt;To facilitate the documentation, the guidance suggest model cards, data cards, meta or system prompts, and &lt;a href="https://www.reversinglabs.com/blog/sbom-what-it-is-and-why-it-matters-software-supply-chain-security"&gt;software bills of materials (SBOMs)&lt;/a&gt;.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Four pillars of AI system security&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The guidelines, which are closely aligned with the software lifecycle practices defined by the NTSC and CISA, are organized around four key areas:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Secure by Design:&lt;/strong&gt;&amp;nbsp;This encompasses raising staff awareness of AI security threats and mitigations, designing systems for security and functionality, assessing risks to the system through threat modeling, and considering security trade-offs when selecting AI models.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt; Secure development: &lt;/strong&gt;This entails tracking assets and securing the supply chain; documenting data, models, and prompts; and managing technical debt throughout the system lifecycle.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Secure deployment:&lt;/strong&gt;&amp;nbsp;This includes securing infrastructure, developing incident response procedures, and releasing AI systems responsibly after security evaluations.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Secure operations:&lt;/strong&gt;&amp;nbsp;This includes monitoring system behaviors and inputs, updating security procedures, and sharing learned security lessons.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2&gt;&lt;strong&gt;The how and why of AI is essential&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Chaitanya Belwal, a senior director at the security firm Tanium, said that while the guidelines touch on the transparency of AI models, more should have been included on interpretability, providing some insight or explanation into how and why a model makes the predictions or decisions that it does. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;“While the document is intended for use at a high level, and it is not supposed to give specifics, one thing it should address is the interpretability of the models.”&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Right now, there are special notes on building machine-learning models, and it also discusses some extra procedures to handle adversarial machine learning (AML), including prompt injection attacks and handling data corruption. But if a model is not interpretable, the developers cannot address several of the challenges mentioned in the document.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/cbelwal/"&gt;Chaitanya Belwal&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Deep neural networks are notorious for being black box–like, and the reasons for assigning particular weights to specific inputs can be decided only after tracing all the steps in developing the system, Belwal explained.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Guidance on interpretability of a model will help align the industry and force it to innovate new techniques and come up with an interpretability score for each model."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Chaitanya Belwal&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Software producers are on the hook&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Securing AI development is going to be critical, especially since the consequences of not doing so could be very painful for providers.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.reversinglabs.com/blog/companies-scramble-to-cover-the-software-supply-chain-security-gaps-survey-takeaways"&gt;complexity of modern software supply chains&lt;/a&gt; makes it harder for end users to understand where responsibility for secure AI lies, the guidelines explained. The agencies added that users — whether end users or providers incorporating an external AI component — do not typically have sufficient visibility or expertise to fully understand, evaluate, or address risks associated with the AI systems they are using.&lt;/p&gt; 
&lt;p&gt;For that reason, the guidelines' authors reasoned, providers of AI components should bear the security burden for their products.&lt;/p&gt; 
&lt;p&gt;Software teams should implement security controls and mitigations where possible within their models, pipelines, and systems, the guidelines recommend, and, where settings are used, implement the most secure option as the default. Where risks cannot be mitigated, the provider should be responsible for informing users further down the supply chain of the risks that they and their own users are accepting and advising them on how to use the component securely.&lt;/p&gt; 
&lt;p&gt;Paul Brucciani, a cybersecurity advisor with WithSecure (formerly F-Secure), said that puts a lot of responsibility on software teams.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“It is interesting to note that the responsibility to develop secure AI lies with the provider, who is not only responsible for data curation, algorithmic development, design, deployment, and maintenance, but also for the security outcomes of users further down the supply chain."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/paul-brucciani/?originalSubdomain=uk"&gt;Paul Brucciani&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;With a system compromise potentially leading to tangible or widespread physical or reputational damage, significant loss of business operations, leakage of sensitive or confidential information, and legal implications, AI cybersecurity risks should be treated as critical, the AI guidance stresses.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fsecure-ai-development-guidance-what-appsec-teams-needs-to-know&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Artificial Intelligence (AI)/Machine Learning (ML)</category>
      <pubDate>Wed, 13 Dec 2023 12:30:00 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/secure-ai-development-guidance-what-appsec-teams-needs-to-know</guid>
      <dc:date>2023-12-13T12:30:00Z</dc:date>
    </item>
    <item>
      <title>MFA and software supply chain security: It's no magic bullet</title>
      <link>https://www.reversinglabs.com/blog/2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/mfa-supply-chain-security-magic-bullet.jpg" alt="MFA and supply chain security: It's no magic bullet" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #212121;"&gt;With attackers increasingly targeting developer accounts and using them to poison software builds, manipulate code, and access secrets and data, development teams are under pressure to lock down their development environments.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;span style="color: #212121;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/mfa-supply-chain-security-magic-bullet.jpg?width=1400&amp;amp;height=732&amp;amp;name=mfa-supply-chain-security-magic-bullet.jpg" width="1400" height="732" alt="mfa-supply-chain-security-magic-bullet" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #212121;"&gt;With attackers increasingly targeting developer accounts and using them to poison software builds, manipulate code, and access secrets and data, development teams are under pressure to lock down their development environments.&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="color: #212121;"&gt;Attackers are targeting the extensive access that a typical developer has to source code, code reviews, code commits, code modification, and other privileged tasks.&lt;/span&gt;&lt;span style="color: #212121;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #212121;"&gt;The attacks on &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;SolarWinds&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/it-only-takes-one-line-of-code-to-ruin-your-day"&gt;Codecov&lt;/a&gt;, and &lt;a href="https://www.varonis.com/blog/revil-msp-supply-chain-attack"&gt;Kaseya&lt;/a&gt; in recent years all demonstrate the havoc that an adversary with access to a development environment can wreak on both the victim organization and its downstream customers.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;Several high-profile organizations have begun requiring developers to use some kind of &lt;a href="https://www.reversinglabs.com/blog/cisa-cybersecurity-performance-goals-update-supply-chain-security"&gt;two-factor or multi&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212121;"&gt;&lt;a href="https://www.reversinglabs.com/blog/cisa-cybersecurity-performance-goals-update-supply-chain-security"&gt;factor authentication (2FA and MFA)&lt;/a&gt; to protect their accounts. However, while authentication &lt;/span&gt;can help secure your &lt;a href="https://www.reversinglabs.com/glossary/software-development-life-cycle-sdlc"&gt;software development life cycle (SDLC)&lt;/a&gt;, it's not a comprehensive approach to managing risk in your supply chain.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;[ Get the new report:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/sscs-report"&gt;The State of Software Supply Chain Security 2024&lt;/a&gt;&lt;span&gt;&amp;nbsp;| Join the conversation:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;Webinar: State of Software Supply Chain 2024&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/webinar/the-state-of-software-supply-chain-2024"&gt;&lt;/a&gt;&lt;span&gt;&amp;nbsp;]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #212121;"&gt;Is it time to mandate MFA?&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;In response to the rise in attacks on the SDLC, GitHub, which constitutes a central component of the software supply chain for many organizations, has begun &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa"&gt;mandating 2FA&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212121;"&gt; for all the 100 million users that submit code to the repository. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;In the months since then, the Microsoft-owned organization has been moving users over to MFA in large numbers. Users have the option of using SMS text messages or time-based, single-use passwords as their second authentication factor. Eventually, developers who choose to not use MFA will be locked out of their accounts. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;Many other code repositories and organizations have begun requiring the same or have implemented MFA for a while. Examples include Apple and Google, which require MFA for all accounts in a developer program. Earlier this year, Valve, the company behind the popular Steam video game platform, &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://steamcommunity.com/groups/steamworks/announcements/detail/3749866608167579206"&gt;announced plans to require MFA&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212121;"&gt; for developers after an attacker compromised a developer's credentials and distributed malware to Steam&lt;/span&gt;&lt;span style="color: #212121;"&gt;'s users.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;Alex Ilgayev, head of security research at Cycode, said organizations need to make 2FA a mandatory requirement for every system in the development process, including code, build, package managers, and cloud.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #212121;"&gt;"&lt;/span&gt;&lt;span style="color: #1d1c1d;"&gt;In many recent breaches, attackers have managed to grasp developer-privileged access to the system through simple techniques like phishing or compromising developer workstations containing a lot of sensitive information such as tokens and passwords. &lt;/span&gt;&lt;span style="color: #1d1c1d;"&gt;Requiring developers to use a second authentication factor, in addition to their password, can mitigate most of these risks while also forcing potential adversaries to develop more sophisticated attacks."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/ilgayev/"&gt;&lt;span style="color: #212121;"&gt;Alex Ilgayev&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;span style="color: #1d1c1d; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: normal;"&gt;&lt;span style="color: #222222;"&gt;The use case for MFA in the SDLC &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Kyle Hankins, managing principal of application security at Coalfire, said MFA increases the likelihood that a developer accessing data or taking an action is who they say they are. &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Historically, passwords are abysmal at doing so consistently and safely, in part because they tend to be stolen/guessed fairly easily or are hard to remember, which poses its own problems. 2FA can mitigate risk caused by stolen credentials and is useful in any situation where the impact of credentials being used by an attacker would have a significant impact."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/kyle-hankins-5720139a/"&gt;Kyle Hankins&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222; background-color: white;"&gt;Potential use cases for MFA in the software development lifecycle include making it harder for attackers to use a developer's credentials to make unauthorized code changes, merges, and commits; stealing credentials and secrets; accessing data; pushing unauthorized infrastructure changes; and releasing software into the production environment. Organizations can also use MFA to secure CI/CD consoles, log dashboards, and pipeline definition files, and they can require accounts with privileges to make major pipeline changes.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;MFA is not an 'end-all solution'&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Scott Gerlach, co-founder and CSO of StackHawk, said &lt;span style="color: #222222; background-color: white;"&gt;it's important to put MFA into perspective. "&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #222222;"&gt;All software development teams and, frankly, every team within an organization, should be using [MFA] to access the systems they need to do their job."&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #222222; background-color: white;"&gt;However, Gerlach said that while implementing MFA helps reduce authentication risk, it is "not an end-all solution."&lt;/span&gt;&lt;span style="color: #222222; background-color: white;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; color: #222222;"&gt;"&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent; color: #222222;"&gt;You still have to design authorization processes to match the job roles needed. Just because someone can authenticate does not mean they should be automatically authorized to perform actions like approve pull requests or push code to production. Sane processes should be in place to ensure testing, code review, and third-party approvals exist in CI/CD processes."&lt;br&gt;&lt;/span&gt;—&lt;a href="https://www.linkedin.com/in/scott-gerlach-kaakaww/"&gt;Scott Gerlach&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Coalfire's Hankins said it's key for development teams to understand that MFA is not solving any core security issue. MFA bolsters the efficacy of existing password and other single-factor authentication mechanisms, but it does not address insider risks.&lt;/span&gt;&lt;span style="color: #222222;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="color: #222222;"&gt;&lt;em&gt;"If an insider can log in with a password, adding [MFA] doesn’t make it harder for that malicious insider to log in. Where it does help is instances where a user might have their password stolen. In that case, the second factor —unless it is also acquired — would prevent the unauthorized access."&amp;nbsp;&lt;/em&gt;&lt;br&gt;&lt;/span&gt;&lt;em&gt;—Kyle Hankins&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;span style="color: #222222;"&gt;Tokens to the rescue?&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;The wide use of security tokens in CI/CD processes is another way to expand authentication, said &lt;span style="color: #212121;"&gt;Cycode's&lt;/span&gt; &lt;/span&gt;&lt;span style="color: #212121;"&gt;Ilgayev. Organizations use security tokens — such as OpenID Connect (OIDC) tokens and access tokens — as keys for granting developers access to the CI/CD pipelines, infrastructure, and secrets needed to build, test, and deploy applications. The tokens contain information such as the user's permissions and scope of access in the pipeline. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212121;"&gt;Most security tokens can perform a range of privileged actions and can bypass MFA configured for that system because they are run through automation, Ilgayev said. "&lt;/span&gt;&lt;span style="color: #1d1c1d;"&gt;For example, I may have 2FA configured for my AWS account, but once I generate service account tokens, I can invoke them anytime and everywhere without the need for additional approval." &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1d1c1d;"&gt;In the modern SDLC, CI/CD processes are usually included in the code repositories. This makes it harder to segregate duties and manage authorization for sensitive build processes, &lt;/span&gt;&lt;span style="color: #212121;"&gt;Ilgayev said. &lt;span style="color: #1d1c1d;"&gt;This gives intruders a potential vector for accessing an organization's production environment via the build system.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #212121;"&gt;"&lt;/span&gt;&lt;/em&gt;&lt;span style="color: #1d1c1d;"&gt;&lt;em&gt;As an example, if I'm using GitHub Actions, the CI is managed in GitHub and can be altered by any developer."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;span style="color: #212121;"&gt;Alex Ilgayev&lt;/span&gt;&lt;/em&gt;&lt;span style="color: #1d1c1d; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #1d1c1d;"&gt;A call to action on a comprehensive approach&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;MFA is also a limited approach because it introduces a certain amount of friction into every login or activity that requires it, Hankins said.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;For some tasks, such as commits to production, especially on publicly accessible sites such as GitHub, MFA is a valuable safeguard. But it can be cumbersome in other instances and does not provide a comprehensive approach to manage the associated risk.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="color: #222222; font-size: 24px;"&gt;&lt;em&gt; "&lt;/em&gt;&lt;span style="color: #1d1c1d;"&gt;&lt;em&gt;While [MFA] can be effective for denying malicious access to code repositories and build services, it doesn't cover the entire SDLC."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;span style="color: #212121;"&gt;Alex Ilgayev&lt;/span&gt;&lt;/em&gt;&lt;span style="color: #1d1c1d; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;&lt;span style="color: #1d1c1d;"&gt;Given the privileged access in question and the potential downstream risk exposed by recent attacks, organizations need a separate set of processes to mitigate risk.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;&lt;span style="color: #1d1c1d;"&gt;&lt;span&gt;Matt Rose, Field CISO at ReversingLabs, said MFA is valuable in helping to ensure that developers are authenticated properly. But adding an additional step to the process of developing code is at odds with the speed and scale in modern DevSecOps environments. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #222222;"&gt;&lt;span style="color: #1d1c1d;"&gt;"In order for it to be effective it has to work with the way developers write and commit code and not a new or different process. The last thing anyone wants is another excuse to push back on security teams."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 12 Dec 2023 12:00:00 GMT</pubDate>
      <author>jaikumar.vijayan@gmail.com (Jaikumar Vijayan)</author>
      <guid>https://www.reversinglabs.com/blog/2fa-and-the-sdlc-how-authentication-can-improve-software-supply-chain-security</guid>
      <dc:date>2023-12-12T12:00:00Z</dc:date>
    </item>
    <item>
      <title>Developers behaving badly: Why holistic AppSec is key</title>
      <link>https://www.reversinglabs.com/blog/developers-behaving-badly-why-holistic-appsec-is-key</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/developers-behaving-badly-why-holistic-appsec-is-key" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/devs-behaving-badly-holistic-app-sec.jpg" alt="Developers behaving badly: Why holistic AppSec is key" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;A recent survey shows that untested software releases, rampant pushing of unvetted and uncontrolled AI-derived code, and bad developer security are all combining to seriously expand security risks across software development. Add in the explosion of low-code/no-code development and economic pressures that are forcing developers to deliver features with less support, and you have an AppSec world that’s facing a tumultuous 2024.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/devs-behaving-badly-holistic-app-sec.jpg?width=1400&amp;amp;height=732&amp;amp;name=devs-behaving-badly-holistic-app-sec.jpg" width="1400" height="732" alt="devs-behaving-badly-holistic-app-sec" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;A recent survey shows that untested software releases, rampant pushing of unvetted and uncontrolled AI-derived code, and bad developer security are all combining to seriously expand security risks across software development. Add in the explosion of low-code/no-code development and economic pressures that are forcing developers to deliver features with less support, and you have an AppSec world that’s facing a tumultuous 2024.&lt;/p&gt;  
&lt;p&gt;While the buzz around shifting security to the left, or earlier in the development lifecycle, is still pushed by many DevSecOps advocates — and for good reason — the mantra of "test early and test often" can only get an application security or product security team so far in moving the needle on software risk.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Comprehensive application security (AppSec) is much more than squashing bugs early in the development lifecycle. Mature organizations recognize that they need to mature their AppSec approach to keep pace with modern development and release practices. Here's why a more holistic AppSec approach is key.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;[ See related: &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign" style="font-weight: bold;"&gt;How legacy AppSec is holding back Secure by Design&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; | See Webinar: &lt;/span&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Secure by Design: &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/secure-by-design" style="font-weight: bold;"&gt;Why Trust Matters for Software Risk Management&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; ]&lt;/span&gt;&lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Curbing bad developer security behavior&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;A recent survey conducted among 500 developers worldwide by SauceLabs illuminated&amp;nbsp; lot about "Developers Behaving Badly," as the survey was dubbed. One of the key themes to bubble up from the report had absolutely nothing to do with when or how testing is conducted. It had to do with the security hygiene practiced by developers daily.&lt;/p&gt; 
&lt;p&gt;The fact is, it's not so great. About three-quarters of developers admit to circumventing security measures by doing things such as disabling multifactor authentication (MFA) or going around the VPN to speed up their work. Similarly, 70% admit they've shared credentials — with 40% saying they do so regularly.&lt;/p&gt; 
&lt;p&gt;This report points to a huge need for security support in creating developer guardrails that are embedded in the CI/CD pipeline, so that developers can still move quickly but do so safely. That means putting in place well-architected identity and access management (IAM) functionality, as well as thoughtful permissions throughout the entire development workflow — but especially when it comes to touching the highest-value assets.&lt;/p&gt; 
&lt;p&gt;Nir Valtman, founder of the software security firm Arnica, said that minimizing the attack surface by reducing the permissions to source code, the place where the problem starts,&amp;nbsp; is key.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"If the company culture is to provide access to push code for all developers, then apply branch protection policies to require pull request-reviews by the right owners and review the CI/CD permissions and triggers."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/valtmanir/"&gt;Nir Valtman&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;A big part of this holistic approach to curbing bad operational security is visibility. Valtman said organizations should also be monitoring for abnormal behavior in development tooling and code repositories. Ideally, security should get buy-in with their approach.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"An abnormal behavior can be the result of an insider threat, account takeover, or a malicious third-party library. Use an anomaly-detection mechanism across your development ecosystem, but make sure the developers like the selected approach. Empower developers to own security in a simple and scalable way — let them pick the right security solution for them.&amp;nbsp;&lt;/em&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;—Nir Valtman&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Shift everywhere with your testing&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Security testing — and the remediation and refactoring that follows — is obviously a core part of every application security program. Unfortunately, in spite of the best efforts of DevSecOps pundits and AppSec advocates today, a lot of the security tests mandated of developers today still remain out of phase with their CI/CD pipeline and manually conducted. When the "Developers Behaving Badly" survey asked developers, 67% said they could and did push code to production without conducting security testing, and nearly a third of them reported that they do it often or very often.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px; font-weight: normal;"&gt;&lt;em&gt;When the "Developers Behaving Badly" survey asked developers, 67% said they could and did push code to production without conducting security testing, and nearly a third of them reported that they do it often or very often.&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The goal of the shift-left movement is to build security gates into the pipeline as early in the development process as possible, and to automate testing. But early tests at the code and component levels won't catch every AppSec risk. Shifting right — or shifting everywhere — allows AppSec teams to identify risk in the context of how software will be deployed, said Saša Zdjelar, Chief Trust Officer at ReversingLabs.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"As you shift right, you lose componentry, or unit-level control, but you gain context, as people add more and more code. As first-party code gets combined with third-party commercial and open-source imports and includes, that container size grows and it becomes something closer and closer to a full-built product."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/sasazdjelar/"&gt;Saša Zdjelar&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;As an organization consumes or produces software, introducing testing at the very end before pushing to production makes it possible to check for malware that may have infiltrated the software supply chain, tampering, problems with digital signatures, and the inclusion of sensitive information or development secrets.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Those are the characteristics of software that we believe should be checked at the very end."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Saša Zdjelar&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Account for development risks from generative AI&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Further complicating the testing issue is the addition of generative AI to the development cycle. Tools such as GitHub Copilot and ChatGPT stand to greatly accelerate developer productivity, but utilizing code produced through GenAI adds more to the risk equation.&lt;/p&gt; 
&lt;p&gt;In a recent &lt;a href="https://securitytable.buzzsprout.com/2094080/13448546-jim-manico-threat-modeling-the-untold-story"&gt;Security Table Podcast&lt;/a&gt;, longtime AppSec veteran Jim Manico, founder of Manicode Security, explained the scenario succinctly.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"To be a developer and not to use AI is going to put you behind the eight ball real fast. To use AI as a developer is necessary because if you don't your productivity is going to be one-third to one-fourth of your peers. But if you're using AI without security review, you're screwed in a bad way."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/jmanico/"&gt;Jim Manico&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The "Developers Behaving Badly" report found that most developers are failing to do that review. Approximately 61% of respondents said they've used untested code generated by ChatGPT, and more than a quarter do it regularly.&lt;/p&gt; 
&lt;p&gt;Holistic AppSec programs are going to need the policies, developer education, tooling, and security guardrails necessary to meet these AI risks head on, as it is inevitable that generative AI is embedded into developer processes given tools like GitHub Copilot.&lt;/p&gt; 
&lt;h2&gt;Low-code/no-code: A call to action on guardrails&lt;/h2&gt; 
&lt;p&gt;Speaking of inevitability, another huge one is the looming risks that are coming for organizations with regard to low-code/no-code development environments — for both professional developers and citizen developers. This is a looming issue that didn't make it into the "Developers Behaving Badly" survey but that, when combined with generative AI, is poised to cause the number of applications needing security scrutiny to mushroom.&lt;/p&gt; 
&lt;p&gt;Michael Bargury, founder of low-code/no-code security firm Zenity and author of the OWASP Top 10 for Low-Code, said the situation was already getting out of control.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"How does application security look when you are taking all your business users under your umbrella and allowing them to push code? And we are seeing [generative AI] make this even more of an issue — we're seeing thousands of applications being developed by AI in low-code/no-code environments and being directly deployed to production."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/michaelbargury/"&gt;Michael Bargury&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Bargury said Zenity is working with many Fortune 100 companies that are grappling with how to create a holistic AppSec problem that includes the enormous body of apps produced in this way. He explained one engagement with a security team that's been looking at applications built by generative AI across their entire organization — 500 AI-derived applications, "and that was before they realized they hadn't accounted for low-code apps."&lt;/p&gt; 
&lt;p&gt;Once the company was able to get a software bill of materials (SBOM) on the low-code environment, it found that it had about 7,000 applications that were built by low-code with generative AI.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"The magnitude is enormous."&lt;br&gt;—Michael Bargury&lt;/span&gt;&lt;/em&gt;&lt;span style="color: black; font-size: 11px; background-color: transparent;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;At the same time, there's no stopping the tide of low-code/no-code. Just like with the rest of development environments, the modern AppSec team will need to start building automated guardrails and testing into low-code/no-code development in order to attain holistic AppSec.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fdevelopers-behaving-badly-why-holistic-appsec-is-key&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 07 Dec 2023 12:30:00 GMT</pubDate>
      <author>ericka@chickowski.com (Ericka Chickowski)</author>
      <guid>https://www.reversinglabs.com/blog/developers-behaving-badly-why-holistic-appsec-is-key</guid>
      <dc:date>2023-12-07T12:30:00Z</dc:date>
    </item>
    <item>
      <title>6 ways AI can help security teams punch back</title>
      <link>https://www.reversinglabs.com/blog/how-ai-can-help-appsec-teams</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/how-ai-can-help-appsec-teams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/ai-security-fight-back.jpg" alt="6 ways AI can help security teams punch back" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;From the moment OpenAI let ChatGPT out of the box, the &lt;a href="https://www.reversinglabs.com/blog/wormgpt-highly-effective-business-email-compromise-made-easy-with-ai-hack"&gt;potential for generative AI and large language models (LLMs) to cause harm&lt;/a&gt; has dominated conversations about the emerging technology.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/ai-security-fight-back.jpg?width=1400&amp;amp;height=732&amp;amp;name=ai-security-fight-back.jpg" width="1400" height="732" alt="ai-security-fight-back" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;From the moment OpenAI let ChatGPT out of the box, the &lt;a href="https://www.reversinglabs.com/blog/wormgpt-highly-effective-business-email-compromise-made-easy-with-ai-hack"&gt;potential for generative AI and large language models (LLMs) to cause harm&lt;/a&gt; has dominated conversations about the emerging technology.&lt;/p&gt;  
&lt;p&gt;Less talked about has been how AI can be a formidable weapon in the hands of the good guys. AI decision makers believe that among departments in the enterprise, IT operations will be affected the most by generative AI — more than security — according to data gathered by Forrester Research.&lt;/p&gt; 
&lt;p&gt;Forrester principal analyst Allie Mellen &lt;a href="https://www.forrester.com/blogs/top-5-things-you-need-to-know-about-how-generative-ai-is-used-in-security-tools/"&gt;said in a new &lt;span&gt;report&lt;/span&gt; on the use of generative AI in security tools&lt;/a&gt; that, while the tools are not yet widely available, they are coming.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Security leaders need to be prepared for this new technology to affect how their teams operate."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/hackerxbella/"&gt;Allie Mellen&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Here are six ways AI can be used by security teams to punch back at adversaries.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See related: &lt;a href="https://www.reversinglabs.com/blog/the-ai-executive-order-what-appsec-teams-need-to-know"&gt;The AI executive order: What AppSec teams need to know&lt;/a&gt; | See Webinar: &lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design: Why Trust Matters for Risk Management&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;1. AI can be used to develop more secure code&lt;/h2&gt; 
&lt;p&gt;Using AI for securing code is still in its infancy and has attracted skepticism from some security practitioners, but its potential can't be denied. In a &lt;span&gt;presentation&lt;/span&gt; at InfoSec World 24, &lt;a href="https://insights.sei.cmu.edu/authors/mark-sherman/"&gt;Mark Sherman&lt;/a&gt;, technical director of the Cyber Security Foundations group in the CERT Division at Carnegie Mellon University's Software Engineering Institute, said early experiments show promise but also have limitations. (See his &lt;a href="https://apps.dtic.mil/sti/trecms/pdf/AD1210424.pdf"&gt;slides from the talk in PDF form&lt;/a&gt;).&lt;/p&gt; 
&lt;p&gt;When using AI to secure code, Sherman cautioned, output must be reviewed by knowledgeable users. Unfortunately, most of the time that doesn't include programmers because they're not very good at reading and evaluating code.&lt;/p&gt; 
&lt;h2&gt;2. AI can help address security staffing issues&lt;/h2&gt; 
&lt;p&gt;Forrester's Mellen said that many implementations of generative AI in security tools today rely on chatbot-style features built into a separate view in an application. "As unique as this is right now, it ultimately does not naturally fit into the analyst workflow and is little more than a novelty,” she said.&lt;/p&gt; 
&lt;p&gt;The real value in generative AI is in addressing tasks automatically that were previously part of the analyst workflow. One example: writing draft incident-response reports. Mellen advised security leaders to look for generative AI implementations that fit into the analyst experience, to help analysts make decisions faster — not just force them to use another view or tab.&lt;/p&gt; 
&lt;p&gt;Generative AI can also improve the performance of less experienced security team members. At the recent Ignite conference, &lt;a href="https://www.linkedin.com/in/vasu-jakkal/"&gt;Vasu Jakkal&lt;/a&gt;, Microsoft corporate vice president for security, compliance, identity, and management, &lt;a href="https://www.microsoft.com/en-us/security/blog/2023/11/15/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite/"&gt;&lt;span&gt;cited a Microsoft study&lt;/span&gt;&lt;/a&gt; that found that “new in career” analysts using AI-enabled tools produced responses to security events that were 44% more accurate and responded 26% faster across all tasks.&lt;/p&gt; 
&lt;p&gt;In addition, a large majority of the analysts said the tools helped improve the quality of their work (86%), reduced the effort needed to complete a task (83%), and made them more productive (86%).&lt;/p&gt; 
&lt;h2&gt;3. AI can aid security teams in report creation&lt;/h2&gt; 
&lt;p&gt;With tasks such as summarizing incidents for reporting purposes and creating human-readable case descriptions, generative AI can be used effectively. It can also convey information in a human-friendly way, which can be valuable in responding to customer service requests and in producing better product documentation.&lt;/p&gt; 
&lt;h2&gt;4. AI can assist security teams in analyzing pattern behavior&lt;/h2&gt; 
&lt;p&gt;With its predictive abilities, generative AI can help identify privacy risks, attacker activity, and risk scenarios, and it can suggest remediation actions.&lt;/p&gt; 
&lt;h2&gt;5. AI can improve threat hunting&lt;/h2&gt; 
&lt;p&gt;Generative AI can add speed and scale for scenarios such as security-posture management, incident investigation and response, and security reporting.&lt;/p&gt; 
&lt;h2&gt;6. AI can be used to unify numerous security solutions&lt;/h2&gt; 
&lt;p&gt;The number of security tools organizations have in use can be overwhelming for teams. Generative AI, for one, can bring together all the security signals and threat intelligence siloed in disconnected tools. That allows security teams to streamline, triage, and obtain a complete end-to-end view of threats across the digital estate, making response easier and quicker for analysts of every level.&lt;/p&gt; 
&lt;h2&gt;The potential is there; it's time to put AI to work&lt;/h2&gt; 
&lt;p&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Generative AI tech has the potential to greatly enhance our ability to detect and respond to cyber threats,” said Joseph Thacker, a security researcher with AppOmni.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“There are already so many companies building AI security analyst agents. It’s going to be vital to use AI for securing digital assets in the future.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/josephthacker/"&gt;Joseph Thacker&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;However, Forrester’s Mellen said patience is in order, because despite vendor promises, "this technology is currently available only to a select set of customers, if at all.”&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Every vendor we mentioned in the report (and have spoken with) has at least a press release related to the generative AI offering that it’s building, but none are generally available, or likely to be generally available, before the first half of 2024."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Allie Mellon&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fhow-ai-can-help-appsec-teams&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Operations</category>
      <category>Artificial Intelligence (AI)/Machine Learning (ML)</category>
      <pubDate>Wed, 06 Dec 2023 12:30:00 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/how-ai-can-help-appsec-teams</guid>
      <dc:date>2023-12-06T12:30:00Z</dc:date>
    </item>
    <item>
      <title>10 tips for building an enterprise threat modeling program</title>
      <link>https://www.reversinglabs.com/blog/10-tips-for-building-an-enterprise-threat-modeling-program</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/10-tips-for-building-an-enterprise-threat-modeling-program" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/map-threat-modeling.jpg" alt="10 tips for building an enterprise threat modeling program" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/map-threat-modeling.jpg?width=1400&amp;amp;height=732&amp;amp;name=map-threat-modeling.jpg" width="1400" height="732" alt="map-threat-modeling" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span&gt;Threat modeling has been taken up by many cybersecurity programs over the past few years. Now, with the release of the &lt;a href="https://www.threatmodelingmanifesto.org/"&gt;Threat Modeling Manifesto&lt;/a&gt; and an industrywide movement toward &lt;a href="https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon"&gt;Secure by Design,&lt;/a&gt; threat modeling has the attention of enterprise management.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Security teams must now map out &lt;a href="https://www.reversinglabs.com/blog/threat-modeling-and-the-supply-chain-an-essential-tool-for-managing-risk-across-the-sdlc"&gt;an actionable threat modeling program&lt;/a&gt;. Here are 10 key tips for how to build a proper foundation for a threat modeling program in the enterprise.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Related: &lt;a href="https://www.reversinglabs.com/blog/threat-modeling-and-the-supply-chain-an-essential-tool-for-managing-risk-across-the-sdlc"&gt;Threat Modeling and Supply Chain: An Essential Tool&lt;/a&gt; | Webinar: &lt;a href="https://www.reversinglabs.com/webinar/threat-modeling-and-software-supply-chain-security"&gt;Threat Modeling and Supply Chain: Why It Matters More Than Ever&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;1. Choose a solid process&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;The first tip is to choose a&amp;nbsp;process that will do the job of threat modeling well. For example, you might consider &lt;a href="https://www.linkedin.com/in/shostack/?trk=lil_course"&gt;Adam Shostack&lt;/a&gt;’s excellent four-question framework for threat modeling, but that isn’t a threat modeling process. In the enterprise, you need more depth, since you will magnify the&amp;nbsp;process across tens, hundreds, or thousands of engineers, depending on your organization's size.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;A simple process with more detail considers five key aspects of a threat modeling process: scope, draw, analyze, mitigate, and document. With scope and draw, you answer Shostack’s question, “What are we building?” The scope step helps engineers understand the level of effort involved in a threat model up front so that they don't try to bite off too much at once. Draw leads engineers into the data flow diagram representation, which is based on polling of threat modeling communities worldwide and appears to be the most prevalent representation is use.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Analyze answers the question, “What can go wrong?” It's the step where engineers consider the potential threats by iterating through a diagram using a methodology such as STRIDE (a mnemonic name derived from "spoofing, tampering, repudiation, information disclosure, and elevation of privilege").&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Mitigate answers the question, “What are we going to do about it?” In this step, engineers focus on applying mitigations to the identified threats.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The process concludes with document, so that the organization maintains a copy of the threat modeling output. Storing the work ensures that there is a starting point for consideration when revisiting a model in the future.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;2. Embrace STRIDE&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;STRIDE is a simple but&amp;nbsp;powerful methodology that is easy to understand and internalize. Use it as a starting point to teach your teams how to threat model, and then graduate to more complex methodologies.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;3: Embed threat modeling in the SDL&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Threat modeling in the enterprise is about repeatability. &lt;/span&gt;&lt;span style="background-color: transparent;"&gt;Embed it as a defined activity within your secure development lifecycle (SDL). First, document the process at a high level and mandate the placement of the threat modeling artifacts inside existing deliverables (if they exist). Then, integrate threat modeling into the systems your teams use daily, such as the Jira and Asana tracking tools.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;4. Focus on the mitigations&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Getting caught up in the thrill of the hunt regarding threats can be easy. Focus your enterprise program and your teams on mitigations. A threat model is only as good as its ability to mitigate threats.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Measure the mitigations created within all the threat models across the organization. Mitigations are the key to measuring the ROI of threat modeling.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;5. Threat modeling quality checks and governance&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Institute a quality-control check for each threat model. The security team can perform only some of the quality checks, so it's good to have security champions&amp;nbsp;in the enterprise to lower the amount of work for security.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Ask these questions for each threat model: Did the team that created the model follow the defined threat modeling process? Were interesting threats discovered? Did the team properly apply mitigations to those threats? Was the model documented correctly? If the answer to most of these questions is yes, the model is giving value to the organization. The answers are not a statement of model quality, though. Instead, they are an acknowledgment that all models offer value. Don’t be judgmental or harsh; build a strong security culture with your feedback.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;After threat modeling reaches a level of maturity inside the enterprise, extend the SDL to have a governance angle to threat modeling. Mandate the production of threat models at a predetermined scoping level. Enforce threat modeling at the user-story level for all new features and refresh threat models every three months when changes exist to the component.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;6. Build a diverse collection of threat modeling champions&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;The Threat Modeling Manifesto says that building a diverse group of threat modeling champions will cause the quality of your threat modeling output to soar. Each role within a team has a different perspective and set of experiences. Product managers see a feature differently than developers or testers do.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;7. Workshop the teaching of threat modeling&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;To deploy threat modeling across the enterprise, tens to thousands of future threat modelers must prepare. Because threat modeling is better caught than taught, one of the best approaches to teaching threat modeling is the workshop method, where&lt;/span&gt;&lt;span&gt;&amp;nbsp;the concepts can be introduced at a high level before diving&amp;nbsp;into performing exercises that put threat modeling into action.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;8. Embrace threat modeling coaches&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Threat modeling coaches are security team members or security champions working with groups for a limited time to teach the threat modeling process alongside the team. Coaches are a powerful construct because they magnify the threat modeling process across a long organization, one unit at a time.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;9. Broaden your threat sources&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;After internalizing STRIDE across the organization, look for other sources of threat to consider. Additional sources provide more context and fodder for the teams as they consider how to go deeper into the threat modeling discipline. &lt;/span&gt;&lt;span&gt;Two good choices are the Application Security Verification Standard (ASVS) from OWASP and Common Weakness Enumeration (CWE) from Mitre.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;10. It's not just tools — it's a mindset&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Tools are essential, but they do not replace the internalization of threat modeling's essence. Threat modeling is a state of mind that the program must teach. After threat modelers grasp why they threat model and how the process works manually, they are ready to embrace threat modeling tools.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;Get started with a good foundation&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Threat modeling in the enterprise can seem like an impossible task. With these 10 tips, you can build or adapt your program to transform every team member into a successful threat modeler.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="font-style: italic;"&gt;Chris Romeo is CEO of the threat modeling company &lt;a href="https://devici.com/"&gt;Devici&lt;/a&gt;. This post originally &lt;/span&gt;&lt;a href="https://www.threatmodelingconnect.com/blog-15/top-10-tips-for-building-an-enterprise-threat-modeling-program-107" style="font-style: italic;"&gt;appeared on Threat Modeling Connect&lt;/a&gt;&lt;span style="font-style: italic;"&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F10-tips-for-building-an-enterprise-threat-modeling-program&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Threat Modeling</category>
      <pubDate>Tue, 05 Dec 2023 12:30:00 GMT</pubDate>
      <author>chris@kerr.ventures (Chris Romeo)</author>
      <guid>https://www.reversinglabs.com/blog/10-tips-for-building-an-enterprise-threat-modeling-program</guid>
      <dc:date>2023-12-05T12:30:00Z</dc:date>
    </item>
    <item>
      <title>The AI executive order: What AppSec teams need to know</title>
      <link>https://www.reversinglabs.com/blog/the-ai-executive-order-what-appsec-teams-need-to-know</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/the-ai-executive-order-what-appsec-teams-need-to-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/robot-eo-ai-security-appsec.jpg" alt="The AI executive order: What AppSec teams need to know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #1c1917;"&gt;The &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/"&gt;White House's sweeping executive order&lt;/a&gt; (EO) on artificial intelligence has put the onus on software vendors to implement proactive measures for assessing and mitigating potential security risks and biases in products that use AI.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;span style="color: #1c1917;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/robot-eo-ai-security-appsec.jpg?width=1400&amp;amp;height=732&amp;amp;name=robot-eo-ai-security-appsec.jpg" width="1400" height="732" alt="robot-eo-ai-security-appsec" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #1c1917;"&gt;The &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/"&gt;White House's sweeping executive order&lt;/a&gt; (EO) on artificial intelligence has put the onus on software vendors to implement proactive measures for assessing and mitigating potential security risks and biases in products that use AI.&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;The full implications of the EO will likely vary depending on the extent to which an organization's products and services might incorporate AI mechanisms or on whether they are dependent on them.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;But at a high level, the EO puts pressure on organizations that produce AI-enabled, AI-generated, or AI-dependent products to adopt new application security (AppSec) practices for assessing these systems for safety, security, and privacy. They will need to account for risks, such as those from cyberattacks, adversarial manipulation of AI models, and potential theft or replication of proprietary algorithms and other sensitive data. Required security measures include penetration testing and red-team procedures to identify potential vulnerabilities and other security defects in finished products.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;The EO also imposes other requirements, including the need for developers of AI systems to guard against the potential for bias to creep into their models, as well the need to maintain data that allows regulators and other stakeholders to audit their development techniques. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Some of the requirements in the new EO on AI are likely to be more relevant for builders of foundational AI systems — as the EO describes them — rather than others. But security teams reviewing AI initiatives are still in the hot seat. &lt;/span&gt;Here's what teams responsible for AppSec need to know.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See related: &lt;a href="https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai"&gt;OWASP Top 10 for LLM bridges the gap between AppSec and AI&lt;/a&gt; | See Webinar: &lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design: Why Trust Matters for Risk Management&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #1c1917;"&gt;A push toward AI security standards&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Darren &lt;span style="color: #222222;"&gt;Guccione, co-founder and CEO at Keeper Security, said d&lt;/span&gt;evelopers will be required to show that their public-facing AI systems are safe, secure, and trustworthy. And all of this will need to be done before an AI or AI-enabled system becomes available to the public.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #1c1917;"&gt;"This EO provides clarity to the subject of accountability in how AI is developed and deployed across organizations."&lt;br&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/darrenguccione/"&gt;Darren Guccione&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Standardized tools and tests will be developed and implemented to provide governance over new and existing AI systems, &lt;span style="color: #222222;"&gt;Guccione&lt;/span&gt; said. With the widespread adoption of AI systems, this means every organization will need to consider the EO.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="color: #1c1917;"&gt;&lt;em&gt;"Given the range of recommendations and actions included, organizations will likely feel the effects of this EO across all sectors, regardless of where they are in their AI journey or what type of AI system is being used."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Darren &lt;span style="color: #222222;"&gt;Guccione&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;span style="color: #1c1917;"&gt;Implementing the EO remains a work in progress&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Many of the details describing how software developers will implement the EO's requirements remains unclear. However, the National Institute of Standards and Technology (NIST) will now develop standards and best practices for developing safe and trustworthy AI systems. This will include standards for red-team testing of AI systems before they are publicly released. The Department of Homeland Security will ensure that organizations in critical-infrastructure sectors apply these standards when using internally developed or externally sourced AI systems.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Ashlee Benge, director of threat intelligence at ReversingLabs, said software development organizations and publishers will need to follow NIST's AI standards and guidelines in order to secure government contracts.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #1c1917;"&gt;"By laying out clear use guidelines and requiring transparency when it comes to security testing, this EO will likely force a deeper consideration of safety measures than may have originally been taken."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/ashleebenge/"&gt;Ashlee Benge&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Benge said that for consumers of AI systems, data privacy — with regard to the use of personally identifiable information (PII) used to train AI models — is a serious concern. &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #1c1917;"&gt;"This is a potentially major issue for any developer of software with AI capabilities."&lt;br&gt;—Ashlee Benge&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Marcus Fowler, CEO of Darktrace Federal, said the EO is a reminder that it is not possible to achieve AI safety without cybersecurity. The edict highlights the need for action on data security, control, and trust on the part of those developing AI systems.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #222222;"&gt; "It’s promising to see some specific actions in the executive order that start to address these challenges."&lt;br&gt;—&lt;/span&gt;&lt;/em&gt;&lt;a href="https://www.linkedin.com/in/marcus-fowler/" style="font-style: italic;"&gt;Marcus Fowler&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Organizations will need to implement systems and safeguards to ensure that red teaming exercises are useful, he said. They will need to implement a continuous process for testing AI security and safety through a product's life cycle. &lt;/span&gt;&lt;span style="color: #222222;"&gt;Fowler said the EO's emphasis on red teaming and penetration testing is relevant to any discussion about AI and security.&amp;nbsp; &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #222222;"&gt;"Red teaming exercises aim to test all the layers of an organization’s security posture. In the case of AI systems, that means testing for security problems, user failures, and other unintended questions."&amp;nbsp;&lt;br&gt;&lt;span style="color: #222222; font-size: 24px;"&gt;—Marcus Fowler&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;The EO also pushes developers of AI systems to implement &lt;a href="https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon"&gt;Secure by Design, introduced this year by the Cybersecurity and Infrastructure Security Agency (CISA) &lt;/a&gt; to shift &lt;span&gt;ownership of security of software from consumers to producers, for &lt;/span&gt;every step of an AI system’s creation and deployment. "Security is a challenge for the here and now, as well as a necessity for tackling longer term risks," Fowler said.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #1c1917;"&gt;A road map and guidelines for AI security&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;Resources are now available for organizations looking to develop their&amp;nbsp;own road map to meeting the EO's objectives. The U.K.'s National Cyber Security Center (NCSC) and the U.S. CISA &lt;/span&gt;&lt;a href="https://www.ncsc.gov.uk/collection/guidelines-secure-ai-system-development"&gt;have released guidelines for secure AI system development&lt;/a&gt;. &lt;span style="color: #1c1917;"&gt;The document provides guidelines that organizations can use to implement Secure by Design principles, as well as the secure development, deployment, operation, and maintenance of AI systems. Each of the four sections in the road map drills down into specific measures that developers of AI systems can take. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;The section on Secure by Design highlights the importance of threat modeling and staff awareness, while the one on secure development focuses on the need to secure the software supply chain, perform asset identification, and track and maintain detailed documentation. The document notes:&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #1c1917;"&gt;"Implementing these guidelines will help providers build AI systems that function as intended, are available when needed, and work without revealing sensitive data to unauthorized parties."&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #1c1917;"&gt;CISA has separately released its own &lt;/span&gt;&lt;a href="https://www.cisa.gov/sites/default/files/2023-11/2023-2024_CISA-Roadmap-for-AI_508c.pdf"&gt;road map for AI&lt;/a&gt;&lt;span style="color: #1c1917;"&gt;, which could serve as a model for developers looking for hints on how U.S. agencies plan to implement the requirements of the new EO on AI.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #222222;"&gt;An SBOM for AI?&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Matt Rose, field CISO at ReversingLabs, said the effective requirements of the EO are similar to that for a software bill of materials (SBOM), given that&lt;span style="color: #000000;"&gt; the EO requires developers to document everything that goes into an AI system, including whether it was created by an AI or a large language model (LLM).&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #222222;"&gt;"If the data that an AI system is pulling from is tainted in any way, it can basically create problems and potentially major security breaches."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: #000000;"&gt;The EO requires being "diligent and granular" about AI safety and security requirements, to ensure that users of AI systems and all other stakeholders have clear visibility into the technology that will house things like government and military secrets, as well as other information of critical national importance. &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: #000000;"&gt;"It goes hand in hand with being fully transparent and self-attesting with an SBOM."&lt;br&gt;&lt;span style="color: #222222;"&gt;—Matt Rose&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;span style="color: #000000;"&gt;Legacy AST is not up to the job of securing AI development&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #000000;"&gt;However, the EO goes beyond attestation, Rose said. Developers will need to consider the security and safety of the AI tools on which their products are built, as well as the potential for hackers and other malicious actors to poison or attack these systems using that AI technology.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #000000;"&gt;One challenge will be to understand where a generative AI system is getting its information. &lt;/span&gt;&lt;span style="color: #000000;"&gt;"They say the Internet is full of fake news. If your AI system is using data scraped from the Internet to come up with directed actions, then the information is only as good as the data it was sourced from," Rose said.&lt;/span&gt;&lt;span style="color: #000000;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #000000;"&gt;Addressing AI-related security challenges is ultimately about the ability to look for and understand the behavior and the source of AI-generated code in applications, Rose said. That &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;requires more than the code scanning in traditional application security testing (AST)&lt;/a&gt;. Rose said software composition analysis (SCA), SBOMs, and complex binary analysis of software packages are essential to securing AI systems.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="color: #000000;"&gt;The EO on AI is an important first step&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;The EO is important step in getting industry to pay attention to security and safety issues as they roll out AI systems, said Darktrace's Fowler. But additional guidance will be needed to help organizations get ahead of risk.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"But as the government moves forward with regulations for AI safety, it's also important to ensure that it is enabling organizations to build and use AI to remain innovative and competitive globally and stay ahead of the bad actors."&lt;br&gt;&lt;span style="color: #222222;"&gt;&lt;span style="color: #222222; font-size: 24px;"&gt;—Marcus Fowler&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-size: 18px;"&gt;&lt;em&gt;&lt;span style="color: #222222;"&gt;&lt;span style="color: #222222;"&gt;See ReversingLabs Field CISO Matt Rose's explainer covering the EO on AI:&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 640px; min-width: 256px; display: block; margin: auto;"&gt;
 &lt;div class="hs-embed-content-wrapper"&gt;
  &lt;div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;"&gt;
   &lt;iframe class="vidyard_iframe" src="http://play.vidyard.com/M3BWraTtMRFny9G3LtZWxC.html?" width="640" height="360" frameborder="0" allowfullscreen style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"&gt;&lt;/iframe&gt;
  &lt;/div&gt;
 &lt;/div&gt;
&lt;/div&gt; 
&lt;p style="font-size: 18px;"&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fthe-ai-executive-order-what-appsec-teams-need-to-know&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 30 Nov 2023 15:39:44 GMT</pubDate>
      <author>jaikumar.vijayan@gmail.com (Jaikumar Vijayan)</author>
      <guid>https://www.reversinglabs.com/blog/the-ai-executive-order-what-appsec-teams-need-to-know</guid>
      <dc:date>2023-11-30T15:39:44Z</dc:date>
    </item>
    <item>
      <title>Don't let CVEs distract you: Shift your AppSec team's focus to malware</title>
      <link>https://www.reversinglabs.com/blog/why-your-appsec-teams-focus-should-shift-to-malware</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/why-your-appsec-teams-focus-should-shift-to-malware" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/vulnerabilities-malware-cve-distract.jpg" alt="Don't let CVEs distract you: Shift your AppSec team's focus to malware" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Chasing vulnerabilities can be a time-consuming and time-wasting pursuit for application security (AppSec) teams. A big part of the problem has been the sheer volume of vulnerabilities being reported in recent years, which increases the chances of invalid reports slipping through the system.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/vulnerabilities-malware-cve-distract.jpg?width=1400&amp;amp;height=732&amp;amp;name=vulnerabilities-malware-cve-distract.jpg" width="1400" height="732" alt="vulnerabilities-malware-cve-distract" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Chasing vulnerabilities can be a time-consuming and time-wasting pursuit for application security (AppSec) teams. A big part of the problem has been the sheer volume of vulnerabilities being reported in recent years, which increases the chances of invalid reports slipping through the system.&lt;/p&gt;  
&lt;p&gt;As ReversingLabs &lt;a href="https://www.secure.software/reports/reversinglabs-nvd-analysis-2022-a-call-to-action-on-software-supply-chain-security"&gt;&lt;span&gt;noted in its report in 2022&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,&lt;/span&gt; flaws in open-source software are contributing to a sharp rise in reports to the National Vulnerability Database (NVD), but emerging software supply chain attacks warrant a rethink of the NVD — and of the approach of software security teams — to go beyond common software vulnerabilities.&lt;/p&gt; 
&lt;p&gt;Adding to the challenge: a Common Vulnerabilities and Exposures (&lt;span&gt;CVE)&lt;/span&gt; process that can be slow and bureaucratic. Not only does that mean that the machinery can't keep up with the rapidly &lt;span&gt;changing&lt;/span&gt; security landscape, but it also encourages researchers to automate their endeavors, leading to an increase in low-quality reports.&lt;/p&gt; 
&lt;p&gt;Two recent cases highlight the problem with the CVE process: &lt;span&gt;CVE&lt;/span&gt;-2020-21469 and &lt;span&gt;CVE&lt;/span&gt;-2020-19909 — both marked with 9.8 &lt;span&gt;CVSS&lt;/span&gt; scores — were deemed not to be vulnerabilities by the maintainers of the projects targeted by those &lt;span&gt;CVEs&lt;/span&gt;.&lt;/p&gt; 
&lt;p&gt;No one is saying you should abandon CVEs and the NVD — plus, updates and enhancements to vulnerability reporting and scoring will improve the system. However, to properly manage AppSec risk, your team needs to shift its focus to malware and tampering, for example. Top subject matter experts explain why.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Get reports: &lt;a href="https://www.reversinglabs.com/the-monsters-in-your-software-supply-chain"&gt;The Monsters in Your Software Supply Chain&lt;/a&gt;&amp;nbsp;| &lt;a href="https://www.secure.software/reports/reversinglabs-nvd-analysis-2022-a-call-to-action-on-software-supply-chain-security"&gt;NVD Analysis: A Call to Action on Supply Chain Security&lt;/a&gt; ]&lt;/p&gt; 
&lt;p&gt;&lt;strong style="font-family: 'DM Sans', sans-serif; font-size: 26px; background-color: transparent;"&gt;The shifting focus of threat actors&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Dan &lt;span&gt;Lorenc&lt;/span&gt;, founder and CEO of &lt;span&gt;Chainguard&lt;/span&gt;, &lt;a href="https://www.linkedin.com/posts/danlorenc_cve-vulnerabilitymanagement-nvd-activity-7102609622657548288-YBxY/"&gt;&lt;span&gt;wrote on LinkedIn about the two problematic CVEs&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, emphasizing that they were only a small representation of a bigger problem with the CVE process.&lt;/span&gt;&lt;a href="https://www.linkedin.com/posts/danlorenc_cve-vulnerabilitymanagement-nvd-activity-7102609622657548288-YBxY/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt; "[These] are part of a larger group — 138 new &lt;span&gt;CVEs&lt;/span&gt; all entered the same day, backdated against things found earlier," he wrote.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Someone is clearly scraping old issues and commits to file these in an automated fashion, without ever getting maintainers involved. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;Yes, &lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;CVSS&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt; is broken and needs to change. Yes, the &lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;NVD&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt; data quality is bad and could be improved. But the overall incentives need to change rapidly and we need a higher bar for &lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;entries&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt; placed against critical projects that will cause the most time to be wasted."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/danlorenc"&gt;Dan &lt;span&gt;Lorenc&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The &lt;a href="https://www.secure.software/reports/reversinglabs-nvd-analysis-2022-a-call-to-action-on-software-supply-chain-security"&gt;ReversingLabs NVD report&lt;/a&gt; noted that in the context of rising software supply chain attacks, the growth in reports to the NVD suggests that the focus of malicious actors is shifting. And yet the NVD is still dominated by flaws in a handful of legacy platforms by firms such as Microsoft, Red Hat, Google, Apple, and Oracle.&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Roger Neal, head of product at AppSec company Apona Security, said t&lt;/span&gt;he CVE reporting process is fundamental to cybersecurity, offering a standardized method for identifying and cataloging vulnerabilities, but it is failing to keep up with the volume of reports and the pace of software development today.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“[It] does have its flaws, mainly due to the sheer volume of vulnerabilities being reported to the NVD database. Additionally, the static nature of the CVSS, which does not account for the actual exploitability of the vulnerability in relation to specific software, can be a limitation.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/roger-neal-70b15319b?trk=feed-detail_main-feed-card_feed-actor-name"&gt;Roger Neal&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Why prioritize malware over vulnerabilities?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Rather than wasting cycles hunting for obscure, non-exploitable or remediated security holes &lt;span&gt;— &lt;/span&gt;and checking that box &lt;span&gt;— &lt;/span&gt;AppSec teams should focus efforts on exploitability and look for evidence of compromise such as malware and tampering. Here are six reasons for prioritizing searching for malicious software over chasing vulnerabilities:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Malware is a real threat, while a CVE may or may not pose a threat to a particular organization. Malware actively targeting systems indicates that actual compromise or exploitation has occurred, compared to theoretical vulnerabilities that may never be leveraged.&lt;/li&gt; 
 &lt;li&gt;Actively looking for malware such as Trojans, viruses, and other malicious software allows for faster incident response to mitigate damage and prevent spreading.&amp;nbsp;&lt;/li&gt; 
 &lt;li&gt;Malware detection gives actionable intelligence to security teams on what they should specifically look for and defend against on their networks.&lt;/li&gt; 
 &lt;li&gt;Focusing on malware leverages defenses better because technologies such as antivirus, network monitoring, and host-based defenses are well suited for detecting known malware signatures and behaviors.&lt;/li&gt; 
 &lt;li&gt;Finding malware shows teams how attackers are operating and the specific techniques they use. It allows security teams to track attackers and align their defenses to real activity.&amp;nbsp;&lt;/li&gt; 
 &lt;li&gt;Malware hunting can uncover unknown threats and may detect new variants or families not tied to known vulnerabilities.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2&gt;&lt;strong&gt;CVSS 4.0 and EPSS to the rescue?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;While acknowledging the importance of ferreting out malicious code, &lt;span&gt;Apona Security’s Neal&lt;/span&gt; advocates for a balanced approach to defending organizations from threats, and he highlights new approaches, &lt;a href="https://www.reversinglabs.com/blog/epss-cvss-application-security-risk"&gt;including the Exploit Prediction Scoring System (EPSS).&lt;/a&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Although the CVSS has its limitations, it shouldn't be completely abandoned. Instead, integrating CVSS with a suitable scoring metric like EPSS can provide a more comprehensive understanding of which vulnerabilities are most likely to be exploited.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Roger Neal&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;A dual approach allows teams to not only address impactful vulnerabilities, but also place equal emphasis on preventing malicious code, thereby enhancing an organization's overall security posture, Neal said. And some of the criticisms of the CVSS have been addressed in the latest version of the standard, version 4.0.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The latest iteration of the CVSS has made significant strides in addressing the challenges associated with the CVE reporting process. This version enhances the granularity and specificity of vulnerability scoring, providing a more accurate depiction of the real-world risk posed by various vulnerabilities.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Roger Neal&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Mayuresh Dani, a threat research manager at Qualys, said CVSS v4.0 adds additional sources such as threat intelligence and alleviates environmental metrics for better scoring a vulnerability. It also adds fields such as attack requirements and user interaction metrics under the exploitability metrics, he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Using these new and granular metrics, consumers can ascertain the real impact of a vulnerability in their environment.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/mayureshdani/"&gt;Mayuresh Dani&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-weight: bold;"&gt;[ See ReversingGlass: &lt;a href="https://www.reversinglabs.com/reversingglass/epss-3.0-cvss-why-prioritizing-software-risk-is-key"&gt;EPSS 3.0 + CVSS: Why Prioritizing Software Risk is Key&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Can more nuanced scoring make CVSS more relevant?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Callie Guenther, a cyberthreat research senior manager at cybersecurity company Critical Start, said the changes in the latest version of CVSS, which&lt;span&gt; focus on ensuring a comprehensive vulnerability assessment and creating a more nuanced scoring methodology, are causes for hope — but will probably require further refinement.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;Guenther said CVSS 4.0 was a "significant leap forward," but she noted that continuous feedback from the cybersecurity community would be critical to its success.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The modular approach in CVSS 4.0, particularly the emphasis on threat intelligence and the introduction of the Supplemental Metric Group, is noteworthy. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;It might benefit from more extensive testing in real-world scenarios to ascertain its robustness."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/callie-guenther-b643b6105/"&gt;Callie Guenther&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Bud Broomhead, CEO of IoT cyber-hygiene firm Viakoo, said the new CVSS version adds a new focus on resiliency, which is often overlooked during the initial stages of an exploit, and also is starting to address the Internet of Things (IoT), operational technology (OT) and industrial control systems (ICS) spaces.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“This new version of CVSS is — as many standards are — a look in the rearview mirror, catching up to the reality of how IoT/OT/ICS exploits have become one of the fastest-growing attack surfaces. &lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-weight: 300; background-color: transparent;"&gt;Organizations concerned about their IoT/OT/ICS attack surface need to use CVSS as a base to build on. For example, the impact on the business from IoT/OT/ICS malicious hacks needs to be assessed in addition to CVSS.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/bud-broomhead-74121/"&gt;Bud Broomhead&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fwhy-your-appsec-teams-focus-should-shift-to-malware&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Wed, 22 Nov 2023 14:45:00 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/why-your-appsec-teams-focus-should-shift-to-malware</guid>
      <dc:date>2023-11-22T14:45:00Z</dc:date>
    </item>
    <item>
      <title>How legacy AppSec is holding back Secure by Design</title>
      <link>https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/SecurebyDesign-logo.png" alt="How legacy AppSec is holding back Secure by Design" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;After years of headline-popping software supply chain–related breaches — think &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;SolarWinds&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/cisa-log4j-threat-will-linger-for-years"&gt;Log4j&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;3CX&lt;/a&gt;, and &lt;a href="https://www.reversinglabs.com/blog/moveit-supply-chain-bug-exploited-for-two-years"&gt;MOVEit&lt;/a&gt; — software security advocates agree that organizations have to change the way they tackle application security (AppSec).&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/SecurebyDesign-logo.png?width=1400&amp;amp;height=732&amp;amp;name=SecurebyDesign-logo.png" width="1400" height="732" alt="SecurebyDesign-logo" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;After years of headline-popping software supply chain–related breaches — think &lt;a href="https://www.reversinglabs.com/blog/sunburst-the-next-level-of-stealth"&gt;SolarWinds&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/cisa-log4j-threat-will-linger-for-years"&gt;Log4j&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/3cx-supply-chain-attack-targeted"&gt;3CX&lt;/a&gt;, and &lt;a href="https://www.reversinglabs.com/blog/moveit-supply-chain-bug-exploited-for-two-years"&gt;MOVEit&lt;/a&gt; — software security advocates agree that organizations have to change the way they tackle application security (AppSec).&lt;/p&gt;  
&lt;p&gt;The overriding consensus from the experts is that software producers need better software development practices, such as following &lt;a href="https://www.cisa.gov/securebydesign"&gt;Secure by Design&lt;/a&gt;, which was proposed in April by the federal Cybersecurity and Infrastructure Security Agency (CISA). The idea of Secure by Design is relatively simple in principle, if difficult in practice to achieve. Security should be baked in at the conception of software, and security functions and parameters should be designed, architected, and coded into the software at every stage of its lifecycle. It advocates security education for developers, varied and thorough testing and detection of vulnerabilities during every step of the lifecycle, and security guardrails that make it easier for developers to code securely.&lt;/p&gt; 
&lt;p&gt;Secure by Design also ideally takes AppSec far beyond trying to code software without security bugs. Most longtime AppSec advocates explain it means hardening application infrastructure, architecting secure data flows, designing solid permissions and identity management into software, and establishing guidelines for secure configurations and deploying them by default.&lt;/p&gt; 
&lt;p&gt;These Secure by Design principles are the first step in transferring the responsibility of keeping software secure from the consumers of that software — who are constantly called to patch or remediate faulty software from their suppliers — and back onto the shoulders of software producers.&lt;/p&gt; 
&lt;p&gt;But &lt;a href="https://www.reversinglabs.com/blog/cisa-secure-by-design-and-financial-liability-too-much-too-soon"&gt;Secure by Design is easier said than done&lt;/a&gt;. Open-source project leads, commercial software development companies, and internal enterprise software engineering teams all must battle against AppSec&amp;nbsp;inertia. Developers and AppSec&amp;nbsp;pros alike still contend with ingrained software development patterns and legacy tool sets built for a more reactive approach to AppSec.&lt;/p&gt; 
&lt;p&gt;The reality: Software security practices are mired in &lt;a href="https://www.reversinglabs.com/blog/the-evolution-of-app-sec-how-to-get-off-the-hamster-wheel-of-scan-and-fix"&gt;after-the-fact application security testing (AST) and scan-and-fix cycles&lt;/a&gt;, fixations on &lt;a href="https://www.reversinglabs.com/blog/owasp-program-founder-calls-for-supply-chain-security-that-goes-beyond-vulnerability-detection"&gt;legacy vulnerability management programs&lt;/a&gt;, and endless patch cycles. Additionally, some security pundits believe that CISA's Secure by Design guidelines &lt;a href="https://www.reversinglabs.com/blog/sca-is-key-but-no-substitute-for-comprehensive-software-supply-chain-security"&gt;don't yet address the complexity of the modern software supply chain&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Here's what's holding back Secure by Design's potential, and how software security can move forward.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See related Webinar: &lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design: Why Trust Matters&lt;/a&gt;&amp;nbsp;]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Holistic AST is key&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Saša Zdjelar, Chief Trust Officer at ReversingLabs and a longtime security practitioner, said the work by CISA &lt;a href="https://www.cisa.gov/news-events/news/next-chapter-secure-design"&gt;to publish its seminal paper on Secure by Design&lt;/a&gt; helped mature industry conversation about software security. But there's still a lot of work needed before these principles, and the practices around them, can address the complexity of securing software today.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"That paper and the months of work put into it was good, but I'd argue that it still predominantly focuses on a very narrow set of problems that can come out of software. And, unfortunately, it's not the type of stuff we've seen in the largest breaches, recently. These breaches are caused by software supply chain ripples. 3CX and SolarWinds have more to do with malware implants and integrity issues than traditional vulnerabilities."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/sasazdjelar/" style="font-style: italic;"&gt;Saša Zdjelar&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Those types of supply chain weaknesses can't be found through traditional AST tools or software composition analysis (SCA), Zdjelar said, "because that's just not what they’re designed for." He said Secure by Design is still too wedded to traditional AST and SCA without encouraging better context of how software is compiled and deployed.&lt;/p&gt; 
&lt;p&gt;For Secure by Design to deliver on it's promise, organizations need more holistic tools that work for producers and consumers of software, Zdjelar said. He explains what he means by holistic AST by describing what crash tests did for ensuring the safety of cars.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"You crash-test it, and then you provide the insights into how it did from various angles at various speeds, airbags, crumple zones, all those sorts of things that we have agreed are the characteristics of a secure vehicle or a safe vehicle. But you wouldn't crash-test a radio volume knob and a windows up-down button and a seatbelt separately and a rear car seat separately and a visor separately. You crash-test the vehicle when it's been fully assembled so that you know how the system as a whole operates or will perform in that type of environment."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Saša Zdjelar&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;One of the &lt;a href="https://www.reversinglabs.com/blog/why-shift-left-is-now-a-dirty-word-in-some-security-circles"&gt;big problems with the shift-left movement&lt;/a&gt; of recent years, Zdjelar said, is that it focuses too intently on component views to the detriment of understanding the context of how it all operates in the completed software package. When Secure by Design is fully realized, the benefit will be early analysis while also doing integrity checks that ensure the crash-worthiness of software before it is shipped.&lt;br&gt;&lt;span style="font-size: 24px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Incentivizing developers is essential&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="background-color: transparent;"&gt;Another big impediment today is that, no matter how comprehensive or well-thought-out a Secure by Design framework may be, it won't count for a whole lot if developers aren't properly incentivized to act on it.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;Hughes said there's no real incentive for developers to slow down or integrate more security, which they often view as friction.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"While security is the center of the universe for us security people, it is not for engineers and developers. One of the big reasons is that they're incentivized and graded in terms of performance based on other factors like the number of features that they push out or how effectively they bring down the backlog or their sprint velocity and all those kinds of performance metrics. They're focused on just getting things out as quickly as they can, and they align with the incentives of how they're graded."&lt;br&gt;—&lt;a href="https://www.aquia.us/meet-chris-hughes"&gt;Chris Hughes&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;This is not the fault of the developers; it's a management problem. That is why Secure by Design demands that security leadership team up with business leadership to properly incentivize engineering.&lt;/p&gt; 
&lt;p&gt;Until development team incentives align with an organization's performance metrics, no behaviors are going to change, Hughes said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"If security matters, we should evaluate people's performance on how they integrate security into the product development lifecycle or add security metrics as part of key performance indicators. It starts at the top, and it has to be institutionalized. Otherwise, nothing is really going to change."&lt;br&gt;—Chris Hughes&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Sound AST methodology matters&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;On a more tactical note, Hughes cautioned that organizations that already have this kind of institutional buy-in still need sound methodology and planning to effectively execute Secure by Design. He recommended that organizations choose something such as the &lt;a href="https://www.reversinglabs.com/blog/the-supply-chain-security-guide-roadmap-for-a-post-solarwinds-world"&gt;NIST Secure Software Development Framework (SSDF)&lt;/a&gt;, which is mapped against the &lt;a href="https://owaspsamm.org/model/"&gt;OWASP Software Assurance Maturity Model (SAMM)&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Organizations that are still relying on legacy AppSec&amp;nbsp;practices should switch to SSDF and SAMM for starters, Hughes said. "Ask, Are we using a secure development framework or methodology? And if we aren't, can we rally around one to start to integrate some of these security practices and techniques into our product development?"&lt;/p&gt; 
&lt;p&gt;However, Zdjelar said the guidance provided by CISA is "not even close to enough,” noting that the most infamous software supply chain attacks — 3CX, SolarWinds, and Kaseya — would have been missed.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;“Not a single component of any of the AppSec programs currently listed in CISA’s guidance would have prevented any one of those.”&lt;br&gt;—Saša Zdjelar&lt;br&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Legacy AppSec tools find certain categories of vulnerabilities, "which are absolutely a concern, and should be worried about, but a &lt;a href="https://www.reversinglabs.com/webinar/devsecops-a-new-hope-for-software-supply-chain-security"&gt;holistic final exam for software is critical&lt;/a&gt;.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“What’s missing is the crash test for the system as a whole.” &amp;nbsp;&lt;/em&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;—Saša Zdjelar&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;When product security met accountability&amp;nbsp;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Effective product security leadership is another thing that is lacking in most organizations and that many experts view as crucial to Secure by Design. David Lindner, CISO at Contrast Security, said product security professionals need to be embedded in product teams.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Product security plays a fundamental and significant role in making sure the core principle of Security by Design is followed. Secure by Design emphasizes integrating security considerations into every phase of a product's lifecycle, from its initial design and development to deployment, maintenance, and eventual retirement. Product security ensures that security is not an afterthought but an integral part of the entire process."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/dlindner/"&gt;David Lindner&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Jamie Boote, an associate principal security consultant at Synopsys Integrity Group, said product security also can play a role in enablement. When product security is done right, the embedded security professionals can help bridge the gaps between security, engineering, and the business by reducing what Boote calls "cognitive friction," the mental effort it takes to understand and solve security problems.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"ProdSec can reduce cognitive friction that developers, architects, engineers, and other stakeholders experience by providing training, clear requirements, reusable solutions, and Secure by Design components that teams can adapt and use with minimal effort."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/jamie-boote-04013412/"&gt;Jamie Boote&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;The developer experience matters&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The idea of easing the security burden for engineers stands at the heart of what Kymberlee Price, a longtime AppSec&amp;nbsp;and security practitioner who recently started a security firm called Zatik, thinks is most direly needed to meaningfully enact Secure by Design.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"I'm honestly excited for Secure by Design as a concept being championed across the industry because that's the only way we are going to make a difference and improve security. I think we've well proven bolting it on after the fact isn't working right."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/kymberleeprice/"&gt;Kymberlee Price&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;However, to help evolve the culture and mindset of engineers, she said, the security team needs to think about improving the secure developer experience.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"For security teams to actually execute on secure by design, we need to shift our mindset of how we create good security UX for developers. It can't just be, 'Do it because I said so.' We have to reach across the gap and say, 'I want to make this easy for you to do the right thing. Help me understand your business.'"&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Kymberlee Price&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Open source isn't the whole &lt;/strong&gt;AppSec&lt;strong&gt;&amp;nbsp;picture&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;ReversingLabs' Zdjelar pointed out another weakness: The current iteration of Secure by Design planning is "hyperfocusing" on open-source software flaws.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"If we're talking here about how to secure enterprises, enterprises don't run on open-source software. They obviously have a lot of open source in use, but when you buy a product from SAP or you buy a corporate password manager or CyberVault, like a CyberArk or even LastPass, that is not open source. When you install Zoom in your environment, when you run Teams on your endpoint, that is not open-source software, and neither was SolarWinds Orion. So what runs enterprises is very, very large, complex commercial packages which may have some open source in them."&lt;br&gt;—Saša Zdjelar&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Zdjelar said that for Secure by Design to be useful for an enterprise software portfolio, it needs to bring better visibility and vetting of commercial, off-the-shelf software into the mix.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Get your bearings on software supply chain security&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Aquia's Hughes said &lt;/span&gt;organizations pursuing Secure by Design need to understand where they exist within the software supply chain, because that affects how they run components and how they ship their code.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Everyone to some extent is a consumer of external software and products but also likely a producer of software and products that are being used either internally or externally by customers and consumers. And just understanding what your role in the ecosystem is and how you can strengthen those relationships and also be prepared if one of them has an incident so that it doesn't impact you or your stakeholders too much is part of the equation."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Chris Hughes&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fhow-legacy-app-sec-holds-back-securebydesign&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Wed, 22 Nov 2023 14:00:00 GMT</pubDate>
      <author>ericka@chickowski.com (Ericka Chickowski)</author>
      <guid>https://www.reversinglabs.com/blog/how-legacy-app-sec-holds-back-securebydesign</guid>
      <dc:date>2023-11-22T14:00:00Z</dc:date>
    </item>
    <item>
      <title>ReversingLabs Launches Software Supply Chain Security Availability in AWS Marketplace</title>
      <link>https://www.reversinglabs.com/blog/reversinglabs-launches-software-supply-chain-security-availability-in-aws-marketplace</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/reversinglabs-launches-software-supply-chain-security-availability-in-aws-marketplace" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/ReversingLabs-AWS-marketplace-Blog.webp" alt="ReversingLabs is now listed on the AWS Marketplace" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;We are thrilled to introduce another powerful way to add software supply chain security to your security strategy. Beginning November 20, ReversingLabs software supply chain security will be available directly through &lt;a href="https://aws.amazon.com/marketplace/pp/prodview-sj7wfyqf4vkv4"&gt;AWS Marketplace&lt;/a&gt;, improving how your team can fortify your application security.&amp;nbsp;&lt;br&gt;&lt;br&gt;AWS Marketplace is a curated catalog for security teams to discover, purchase, deploy, and manage third-party software, data, and services. The platform offers an array of cybersecurity solutions, among others. AWS Marketplace enables customers to compare options, read reviews, and quickly find their desired software. Then, they can deploy it to their Amazon Elastic Compute Cloud instance using 1-Click or the AWS Marketplace Management Portal. This approach empowers organizations to bolster their security posture with efficiency and agility.&lt;br&gt;&lt;br&gt;Security teams often grapple with many vendors and security priorities as the threat landscape expands. &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022"&gt;Recent trends indicate that many security leaders seek to consolidate their vendors and processes&lt;/a&gt;. AWS has emerged as a popular solution to achieve this goal. It enables this transformation through:&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/ReversingLabs-AWS-marketplace-Blog.webp?width=1400&amp;amp;height=732&amp;amp;name=ReversingLabs-AWS-marketplace-Blog.webp" width="1400" height="732" alt="ReversingLabs-AWS-marketplace-Blog" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;We are thrilled to introduce another powerful way to add software supply chain security to your security strategy. Beginning November 20, ReversingLabs software supply chain security will be available directly through &lt;a href="https://aws.amazon.com/marketplace/pp/prodview-sj7wfyqf4vkv4"&gt;AWS Marketplace&lt;/a&gt;, improving how your team can fortify your application security.&amp;nbsp;&lt;br&gt;&lt;br&gt;AWS Marketplace is a curated catalog for security teams to discover, purchase, deploy, and manage third-party software, data, and services. The platform offers an array of cybersecurity solutions, among others. AWS Marketplace enables customers to compare options, read reviews, and quickly find their desired software. Then, they can deploy it to their Amazon Elastic Compute Cloud instance using 1-Click or the AWS Marketplace Management Portal. This approach empowers organizations to bolster their security posture with efficiency and agility.&lt;br&gt;&lt;br&gt;Security teams often grapple with many vendors and security priorities as the threat landscape expands. &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022"&gt;Recent trends indicate that many security leaders seek to consolidate their vendors and processes&lt;/a&gt;. AWS has emerged as a popular solution to achieve this goal. It enables this transformation through:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Simplify procurement:&lt;/span&gt; AWS Marketplace makes it easy for customers to acquire, manage, and oversee third-party data from a single platform. Customers can consolidate their billing of AWS Marketplace purchases with their other AWS services, leading to enhanced financial management. This unified view of costs streamlines billing processes, reducing administrative overhead.&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Optimize costs:&amp;nbsp;&lt;/span&gt;Customized pricing, payment schedules, and contract terms help organizations ensure the scope of work and payment schedule align with organizational requirements. AWS Marketplace further empowers security teams to save resources by monitoring all IT spending with &lt;a href="https://docs.aws.amazon.com/cost-management/latest/userguide/what-is-costmanagement.html"&gt;AWS cost management tools&lt;/a&gt; and centralizing software license entitlement management.&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Better control and governance:&amp;nbsp;&lt;/span&gt;Customers can have better control and governance over software spend by leveraging &lt;a href="https://aws.amazon.com/marketplace/features/privatemarketplace"&gt;Private Marketplace&lt;/a&gt;, a customizable digital catalog of authorized software and data products, as well as &lt;a href="https://aws.amazon.com/marketplace/features/vendor-insights/"&gt;Vendor Insights&lt;/a&gt; to simplify third-party software risk assessments by compiling security and compliance information into a unified dashboard&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;According to a &lt;a href="https://aws.amazon.com/blogs/awsmarketplace/total-economic-impact-aws-marketplace-commissioned-study-forrester-consulting/"&gt;2022 Forrester Total Economic Impact study&lt;/a&gt;, AWS Marketplace customers experienced significant advantages, including&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;75% reduction in onboarding efforts for new vendors&lt;/li&gt; 
 &lt;li&gt;66% time savings due to procurement efficiencies and a&lt;/li&gt; 
 &lt;li&gt;10% reduction in licensing costs.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;David Hoffman, Senior Business Manager for Sony Corporation of America &lt;a href="https://aws.amazon.com/marketplace/solutions/awsmp-all-case-studies"&gt;shares&lt;/a&gt; that AWS:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 22px;"&gt;&lt;em&gt;“Let us connect our AWS and Trend Micro bills to understand how the two are related. It helped us reduce procurement time on approved software from 60 days to a few minutes and made our billing and chargeback process much easier. We are now able to provide straightforward access to software in the cloud for our employees, streamlining the procurement process while still maintaining control…. [W]e have improved our overall security stance as well as established an improved process for quickly and securely getting products into the cloud”&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Do you work with a cybersecurity reseller, consulting firm, or advisory group? No problem. Many of ReversingLabs’ premier partners, such as Guidepoint and Optiv, provide their expertise in addition to the benefits of AWS Marketplace.&lt;br&gt;&lt;br&gt;Are you ready to explore software supply chain security in AWS Marketplace? &lt;a href="mailto:partners@reversinglabs.com"&gt;Contact our partnership team &lt;/a&gt;to learn more. Embrace a new level of security, efficiency, and control in your security strategy today.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Visit &lt;/span&gt;&lt;a href="https://aws.amazon.com/marketplace/pp/prodview-sj7wfyqf4vkv4" style="font-weight: bold;"&gt;ReversingLabs’ AWS Marketplace listing&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Freversinglabs-launches-software-supply-chain-security-availability-in-aws-marketplace&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Company &amp; Events</category>
      <pubDate>Wed, 22 Nov 2023 10:00:00 GMT</pubDate>
      <guid>https://www.reversinglabs.com/blog/reversinglabs-launches-software-supply-chain-security-availability-in-aws-marketplace</guid>
      <dc:date>2023-11-22T10:00:00Z</dc:date>
      <dc:creator>Ben Rice</dc:creator>
    </item>
    <item>
      <title>Protestware taps npm to call out wars in Ukraine, Gaza</title>
      <link>https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Protestware-taps-npm-to-call-out-wars-in-Ukraine-and-Gaza.webp" alt="Protestware taps npm to call out wars in Ukraine, Gaza" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Newly discovered open source software packages on the npm platform contain scripts that broadcast peace messages related to ongoing conflicts in Ukraine and on the Gaza Strip when they are deployed, according to research conducted by ReversingLabs.&amp;nbsp;&lt;br&gt;&lt;br&gt;The packages are just the latest examples of so-called “protestware,” a recurrent issue in the open source software ecosystem in which application developers conceal political messages inside open source code, often designing it to display to the user after an application is installed or when it is executed.&lt;/p&gt; 
&lt;p&gt;Although the latest packages are not malicious, they underscore a persistent risk in open source software, in which unintended and malicious features can lurk undetected — even in widely used applications.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Protestware-taps-npm-to-call-out-wars-in-Ukraine-and-Gaza.webp?width=1400&amp;amp;height=732&amp;amp;name=Protestware-taps-npm-to-call-out-wars-in-Ukraine-and-Gaza.webp" width="1400" height="732" alt="Protestware taps npm to call out wars in Ukraine, Gaza " style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Newly discovered open source software packages on the npm platform contain scripts that broadcast peace messages related to ongoing conflicts in Ukraine and on the Gaza Strip when they are deployed, according to research conducted by ReversingLabs.&amp;nbsp;&lt;br&gt;&lt;br&gt;The packages are just the latest examples of so-called “protestware,” a recurrent issue in the open source software ecosystem in which application developers conceal political messages inside open source code, often designing it to display to the user after an application is installed or when it is executed.&lt;/p&gt; 
&lt;p&gt;Although the latest packages are not malicious, they underscore a persistent risk in open source software, in which unintended and malicious features can lurk undetected — even in widely used applications.&lt;/p&gt;  
&lt;h2&gt;Protest package for Palestine&lt;/h2&gt; 
&lt;p&gt;The npm package &lt;a href="https://www.npmjs.com/package/e2eakarev" style="font-style: italic;"&gt;e2eakarev&lt;/a&gt;, version: 7.1.0, published in late October, describes itself as a “free Palestine protest package” and was posted by the npm user ~updater.downloader. It has a total of 8 downloads. ReversingLabs researcher Lucija Valentić found that installing the package launches a postinstall script, &lt;span style="font-style: italic;"&gt;index.js&lt;/span&gt;, which checks to see if the package is being launched in Israel. If it is, an English language message calling for peace is displayed in the terminal.&lt;/p&gt; 
&lt;p&gt;“The world has witnessed too much suffering in Palestine, and it is time for us to take a stand,” the message reads in part. It calls on those reading the message to raise awareness of the “Palestinian struggle,” donate to humanitarian aid and back the “Boycott, Divest, Sanction" (BDS) movement, which seeks to encourage individuals and businesses to divest from Israel.&lt;/p&gt; 
&lt;p&gt;The message is signed “The Anonymous Protester.” And that… is about it. The package was not observed to perform any other actions — malicious or not, Valentić said.&lt;/p&gt; 
&lt;h2&gt;Protestware: Sneaky!&lt;/h2&gt; 
&lt;p&gt;Another npm package that was found recently to contain protestware is &lt;a href="https://www.npmjs.com/package/@snyk/sweater-comb" style="font-style: italic;"&gt;@snyk/sweater-comb,&lt;/a&gt; version 2.1.1, which was first published in August, 2023 by the firm Snyk. &lt;span style="font-style: italic;"&gt;Sweater-comb&lt;/span&gt; is described as a “tool which provides guardrails with automation” of Snyk APIs by applying custom &lt;a href="https://useoptic.com"&gt;Optic CI&lt;/a&gt; rules to Snyk's OpenAPI specifications. Version 2.1.1 includes the &lt;span style="font-style: italic;"&gt;module es5-ext&lt;/span&gt;, &lt;a href="https://www.npmjs.com/package/es5-ext"&gt;ECMAScript 5 extensions&lt;/a&gt;, a common module with more than 7.3 million weekly downloads. This is the last version of the Snyk package that includes the &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; module, with protestware functionality. All package versions since have opted out from using it as a dependency.&lt;br&gt;&lt;br&gt;What does this protestware do? After installation, &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; launches a postinstall script, &lt;span style="font-style: italic;"&gt;_postinstall.js&lt;/span&gt;, which attempts to determine the geographic location of the host. If the host machine is located in Russia, it shows a message, in Russian, that is critical of Russia's invasion of neighboring Ukraine, and in Russian when the package is installed in Russia.&amp;nbsp;&lt;br&gt;&lt;br&gt;“The whole world condemned the unjustified invasion and decided to impose unprecedented sanctions against Russia,” it reads. “With each new day they will be felt stronger and stronger among civilians.” Russian speakers reading the message are encouraged to download the Tor browser, and visit a web page on how to circumvent censorship in the country.&amp;nbsp;&lt;br&gt;&lt;br&gt;As it turns out, &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; is a package with a long history. The firm Checkmarx&lt;a href="https://checkmarx.com/blog/new-protestware-found-lurking-in-highly-popular-npm-package/"&gt; reported on it in March 2022&lt;/a&gt;, noting that the protestware feature was added to the &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; package in early March of that year, shortly after Russia invaded Ukraine. The same report also highlighted another module, &lt;span style="font-style: italic;"&gt;styled-components&lt;/span&gt;, that was likewise updated to include a post-install script that offered pro-Ukraine protest messages.&amp;nbsp;&lt;br&gt;&lt;br&gt;ReversingLabs researchers have subsequently found the &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; used in other popular applications, including the installation executable for Signal Messenger for Windows. With about 10 million weekly downloads, the reach of the &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; package is broad. Within developer forums, the issue of the protestware features &lt;a href="https://github.com/medikoo/es5-ext/issues/186"&gt;frequently crops up&lt;/a&gt;, as developers utilizing the &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; module contend with antivirus programs flagging their wares as infected with a virus.&lt;br&gt;&lt;br&gt;Since July 2023, ReversingLabs detected 179 npm packages using the &lt;span style="font-style: italic;"&gt;es5-ext&lt;/span&gt; package (a count that includes every version of each npm package). That isn’t a huge number. However, that list includes many legitimate packages like &lt;em&gt;sweater-comb&lt;/em&gt;, Signal and version 6.4.0 of the &lt;a href="https://www.npmjs.com/package/shut"&gt;shut framework&lt;/a&gt; with substantial distributions and user bases.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/ReversingLabs-report-for-Signal-Messenger-Windows-installation-executable.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/ReversingLabs-report-for-Signal-Messenger-Windows-installation-executable.webp?width=1400&amp;amp;name=ReversingLabs-report-for-Signal-Messenger-Windows-installation-executable.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 1: ReversingLabs’ report for Signal Messenger Windows installation executable showing the presence of protestware&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;That is concerning, because even though the postinstall script displaying the pro-Ukraine message isn’t malicious, it is unneeded.&amp;nbsp;&lt;br&gt;&lt;br&gt;“The problem is that this package is doing more than it advertises. It not only extends es5 with extra methods and shims, it also implements a "Call for peace" message. I think it's an unacceptable practice that slows done [sic] installation process,” a developer with the handle Rush commented on GitHub. &amp;nbsp;&lt;br&gt;&lt;br&gt;And that’s a problem. The ability of sketchy and unnecessary code like the latest protestware in &lt;em&gt;es5-ext&lt;/em&gt; to work its way into widely used and legitimate applications and platforms like Signal, the shut framework and &lt;em&gt;sweater-comb&lt;/em&gt; suggests that the cyber risks lurking in software supply chains are real.&lt;/p&gt; 
&lt;h2&gt;Righteous? Yes. Malicious? Maybe.&lt;/h2&gt; 
&lt;p&gt;Both of the examples of protestware cited above were just that: software that is used to convey a message of protest. ReversingLabs did not observe malicious functionality designed to disrupt the systems running the protestware, steal sensitive information or engage in lateral movement in either case.&amp;nbsp;&lt;br&gt;&lt;br&gt;However, not all protestware is benign. In the immediate aftermath of Russia’s invasion of Ukraine in February 2022, for example, an update to the &lt;a href="https://github.com/vuejs/vue-cli/issues/7054" style="font-style: italic;"&gt;vue-cli open source module&lt;/a&gt; was updated to include functionality that identified systems running in Russia and &lt;a href="https://krebsonsecurity.com/2022/03/pro-ukraine-protestware-pushes-antiwar-ads-geo-targeted-malware/"&gt;then wiped them of sensitive files and information&lt;/a&gt;.&amp;nbsp;&lt;br&gt;&lt;br&gt;As violent conflicts crop up around the globe, expect more instances of protestware that takes up the cause of both innocent victims and warring parties. In some cases, that protestware may come in the form of updates to benign and even well-established modules. A certain percentage of it will cross the line from benign display messages to actually inflicting damage on targeted systems.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Dig deep on package security&lt;/h2&gt; 
&lt;p style="font-size: 18px;"&gt;The lesson for organizations is that the days of whistling past the graveyard when it comes to software supply chain threats is over. Developers inclined to make hasty conclusions about the security or integrity of any piece of software based on its past performance, age or popularity are setting themselves up to be disappointed, said Tomislav Peričin, the co-founder and Chief Software Architect for ReversingLabs.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;“We have seen an increase in the number of software supply chain attacks, impactful vulnerabilities, and other incidents. The risks that developers and software consumers face have never been higher, and that includes political messages. Having software perform random acts of political activism does little for the specific cause. But it does decrease the private sector’s already shaky trust in software."&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;—&lt;a href="https://www.linkedin.com/in/tomislav-peri%C4%8Din-746064286/"&gt;Tomislav Peričin&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;If you’re lucky, that disappointment may come in the form of a postinstall script throwing up an unexpected appeal for peace. At the worst, the protest may take the form of a wiped system, stolen data or a fast-spreading worm.&amp;nbsp;&lt;br&gt;&lt;br&gt;The presence of political protest messages in open source code is just one more indicator of the need for development organizations to dig deeper into the function and integrity of the open source, as well as third-party and proprietary code they rely on. Postinstall scripts like the ones found in &lt;em&gt;e2eakarev&lt;/em&gt; and &lt;em&gt;es5-ext&lt;/em&gt; may not cause damage, but they are often an indication of the willingness of the package developers to use their code as a platform for their own words, actions and ideas. When that happens without adequate disclosure to the users of the module (as was the case with &lt;em&gt;es5-ext&lt;/em&gt;), it is cause for concern and additional scrutiny for any development organization.&amp;nbsp;&lt;br&gt;&lt;br&gt;ReversingLabs is constantly hunting for suspicious package behaviors. Our Software Supply Chain Security platform uses behavior indicators that can track if packages have &lt;em&gt;postinstall&lt;/em&gt; scripts, allowing us to spot protest packages like &lt;em&gt;e2eakarev&lt;/em&gt; and &lt;em&gt;es5-ext &lt;/em&gt;and determine whether they are benign, malicious or somewhere in between. That kind of scrutiny of software dependencies is increasingly important as both malicious and political actors look to software supply chains to make their presence felt.&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Next steps&lt;/h2&gt; 
&lt;p&gt;As the discovery of these latest examples of protestware indicate, development and application security teams need the ability to peer deeper inside software packages and distinguish malicious functions from legitimate ones.&amp;nbsp;&lt;br&gt;&lt;br&gt;This can be challenging with &lt;a href="https://www.reversinglabs.com/blog/why-app-sec-testing-alone-is-not-enough-to-secure-your-software-supply-chain"&gt;legacy application security testing tools&lt;/a&gt;, and demands specialized skills and knowledge that many organizations lack. Modern tools like &lt;a href="https://www.reversinglabs.com/products/software-supply-chain-security"&gt;ReversingLabs Software Supply Chain Security&lt;/a&gt; can bridge the gaps, and help development and application security teams protect their supply chain from compromise.&lt;/p&gt; 
&lt;h2&gt;Indicators of Compromise (IoC)&lt;/h2&gt; 
&lt;p&gt;The following IoCs were collected as part of ReversingLabs researchers' investigation of the &lt;em&gt;e2eakarev &lt;/em&gt;and &lt;em&gt;sweater-comb/es5-ex&lt;/em&gt; protestware packages.&lt;/p&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 30.0476%; padding: 4px; background-color: #171d38; border: 1px solid #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;package_name&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 20.5962%; padding: 4px; background-color: #171d38; border: 1px solid #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;version&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
    &lt;td style="width: 49.3562%; padding: 4px; background-color: #171d38; border: 1px solid #171d38;"&gt;&lt;strong&gt;&lt;span style="color: #ffffff;"&gt;SHA1&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 30.0476%; padding: 4px;"&gt;e2eakarev&lt;/td&gt; 
    &lt;td style="width: 20.5962%; padding: 4px;"&gt;7.1.0&lt;/td&gt; 
    &lt;td style="width: 49.3562%; padding: 4px;"&gt;a509f299c5a76ac0c91f9bfdd333cc367ce17dfa&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 30.0476%; padding: 4px;"&gt;sweater-comb&lt;/td&gt; 
    &lt;td style="width: 20.5962%; padding: 4px;"&gt;2.1.1&lt;/td&gt; 
    &lt;td style="width: 49.3562%; padding: 4px;"&gt;b76ec90d7e1ae59b108b62ee8f8979a98b99da28&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fprotestware-taps-npm-to-call-out-wars-in-ukraine-gaza&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Research</category>
      <pubDate>Thu, 16 Nov 2023 12:30:00 GMT</pubDate>
      <author>paul.roberts@reversinglabs.com (Paul Roberts)</author>
      <guid>https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza</guid>
      <dc:date>2023-11-16T12:30:00Z</dc:date>
    </item>
    <item>
      <title>Zero trust and threat modeling: Is it time for AppSec to get on board?</title>
      <link>https://www.reversinglabs.com/blog/zero-trust-and-threat-modeling-is-it-time-for-appsec-to-get-on-board</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/zero-trust-and-threat-modeling-is-it-time-for-appsec-to-get-on-board" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/zero-trust-appsec-threat-modeling.jpg" alt="Zero trust and threat modeling: Is it time for AppSec to get on board?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;As the use of zero-trust architecture grows, it's becoming apparent to threat modelers that if they want to reap benefits, they will need to modify their existing practices to do it.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/zero-trust-appsec-threat-modeling.jpg?width=1400&amp;amp;height=732&amp;amp;name=zero-trust-appsec-threat-modeling.jpg" width="1400" height="732" alt="zero-trust-appsec-threat-modeling" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;As the use of zero-trust architecture grows, it's becoming apparent to threat modelers that if they want to reap benefits, they will need to modify their existing practices to do it.&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;With classic threat modeling, born from the fortified-perimeter school of cybersecurity, the trusted boundary divides protected assets and trusted users from threats and adversaries. Zero trust scraps that idea. And it can also be used to bolster application security, or AppSec.&lt;/p&gt; 
&lt;p&gt;Chris Romeo, CEO of the threat modeling startup Devici, wrote in a recent &lt;a href="https://devici.com/blog/zero-trust-threat-modeling"&gt;&lt;span&gt;blog post &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that&lt;/span&gt; zero trust–based security assumes attackers are in the environment and that data sources and flows can no longer be hidden, which is essential to hardening AppSec.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 24px; font-weight: 300; background-color: transparent;"&gt;"[Zero trust] has vast implications for application security and threat modeling. Zero-trust threat modeling means the death of the trust boundary. This uncovers threats never dreamed of in classic threat modeling."&lt;br&gt;&lt;/span&gt;&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 24px; font-weight: 300;"&gt;—&lt;a href="https://www.linkedin.com/in/securityjourney/"&gt;Chris Romeo&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Here's what your team needs to know about zero trust and thread modeling — including key benefits and challenges when extending it to harden your AppSec.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Learn more: &lt;a href="https://www.reversinglabs.com/blog/threat-modeling-and-the-supply-chain-an-essential-tool-for-managing-risk-across-the-sdlc"&gt;Threat modeling and the supply chain: An essential tool for managing risk&lt;/a&gt; | Webinar: &lt;a href="https://www.reversinglabs.com/webinar/threat-modeling-and-software-supply-chain-security"&gt;Supply chain security meets threat modeling: Why it's needed&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;Expanding the zero-trust concept to AppSec&lt;/h2&gt; 
&lt;p&gt;Patrick Tiquet, vice president for security and architecture at Keeper Security, said that instead of relying on traditional perimeter-based security measures, zero trust assumes no implicit trust, so verification is required from anyone or anything trying to access resources — including software, which represents a growing attack surface.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"With a growing majority of ransomware attacks, supply chain vulnerabilities, and insider threats originating from what is traditionally thought to be inside the security boundary, zero-trust threat modeling has become critical."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/patrick-tiquet-1ba9b497/" style="font-style: italic;"&gt;Patrick Tiquet&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Tiquet said threat modelers must accept the reality that there is no trusted safe zone and adjust their models to recognize threats that may be anywhere — including inside the traditional boundaries. That's essential when considering &lt;a href="https://www.reversinglabs.com/blog/owasp-program-founder-calls-for-supply-chain-security-that-goes-beyond-vulnerability-detection"&gt;the nature of today's software supply chain attacks&lt;/a&gt;.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Flexible boundaries are key to zero trust&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Dhaval Parekh, senior director for information security at the cloud security company Zscaler, said that r&lt;span style="font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: 300; background-color: transparent;"&gt;ather than disappearing entirely, trust boundaries in zero trust become more fluid and dynamic. “Each component, user, or device is evaluated individually based on their authentication, authorization, and behavior,” he said.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The trust boundary in a zero-trust environment shifts from being a fixed perimeter to a more granular and context-dependent boundary. It is defined by the access controls, authentication mechanisms, and continuous monitoring in place for each component. The trustworthiness of a component is established through ongoing verification of its identity, behavior, and compliance with security policies.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Dhaval Parekh&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Parekh offered four recommendations for zero trust in general threat models — which can also be applied to AppSec.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Identify and validate assumptions.&lt;/span&gt; Challenge traditional assumptions about trust within the network and consider that no user or device should be inherently trusted. Threat modelers should question assumptions about network boundaries and trust relationships between different components.&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Define trust boundaries.&lt;/span&gt; Clearly define trust boundaries and enforce strict access controls at each boundary. Threat modelers should consider implementing microsegmentation to create smaller trust zones within the network, allowing for more granular access control and limiting lateral movement in case of a breach.&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Assess and mitigate risks.&lt;/span&gt; Analyze potential attack vectors and vulnerabilities within the system. Identify potential threats, such as insider threats, compromised devices, or malicious actors, and evaluate their impact on the system. Implement appropriate security measures to mitigate these risks.&lt;/li&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Consider zero-trust architecture.&lt;/span&gt; Threat modelers should recommend evaluation and the adoption of a zero-trust architecture, such as the use of software-defined perimeters (SDP) or secure access service edge (SASE) solutions. These architectures provide comprehensive security controls and help enforce zero-trust principles effectively.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2&gt;&lt;strong&gt;How zero trust benefits all threat modelers&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Zero trust can be beneficial to threat modelers because it weans them off the “outside-in” mindset, said Andrew Barratt, managing principal for solutions and investigations at Coalfire. “You’re essentially deeply considering how an assumed bad actor, from any resource, may try to compromise any other resources."&lt;/p&gt; 
&lt;p&gt;Barratt said zero trust means that all resources should have zero access by default and explicitly look for approved, authorized, and authenticated access. And that applies to locking down your entire software supply chain,&lt;a href="https://www.reversinglabs.com/blog/8-cicd-security-best-practices-software-pipeline"&gt; including all CI/CD tools, for example&lt;/a&gt;.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;"From a threat modeling perspective, we now have to consider the threats that might have compromised credentials and are living off the land. Those new threats are actors that look like approved users or activities, and, as such, we need to consider behavioral analysis to determine how likely the actor is to be rogue.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/andrewbarratt/"&gt;Andrew Barratt&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;One of the challenges this new way of thinking imposes on threat modelers is that they must have a very high depth of understanding of the systems being protected.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The collaboration when modeling these threats will require multiple sets of expertise, as well as the ability to consider that a threat actor may already have found access or has compromised an authorized user, perhaps even physically with threats of violence."&lt;/em&gt;&lt;br&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;—Andrew Barratt&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Zscaler's Parekh said that by challenging traditional trust assumptions — and considering all components as potentially untrusted — threat modeling can identify a wider range of attack vectors and vulnerabilities that may have been overlooked in traditional models.&lt;/p&gt; 
&lt;p&gt;However, Anthony Tam, manager of security engineering at Tigera, said there is some downstream risk with zero trust and AppSec because, as zero trust increases the focus of the security model around application and infrastructure, it can open the door to adversaries elsewhere. Teams need to be aware and account for this risk.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;“Vulnerabilities in the application or software dependencies can be attack vectors that bypass the security controls that were designed in a system’s zero-trust model."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/anthony-tam/" style="font-style: italic;"&gt;Anthony Tam&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Parekh said zero trust’s emphasis on the principle of least privilege can help manage such risks, because it allows potential attack surfaces to be identified and reduced by implementing appropriate access controls, microsegmentation, and network segmentation techniques.&lt;/p&gt; 
&lt;p&gt;Zero trust also promotes the implementation of granular access controls at every level of a system, so threat modelers can identify and evaluate the specific access requirements for each component and user, enabling more precise threat analysis and risk mitigation strategies, Parekh said.&lt;/p&gt; 
&lt;p&gt;With continuous monitoring and detection of anomalous activities, threat modelers can leverage zero trust to identify the necessary monitoring capabilities and detection mechanisms to detect potential threats and security incidents.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“By incorporating continuous monitoring into the threat model, organizations can proactively identify and respond to security events in a zero-trust environment."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Dhaval Parekh&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Key challenges for threat modeling and AppSec&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Working with zero trust can be trying for AppSec threat modelers, said Devici's Romeo.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Zero trust is vast and complex, and securing something complex versus simple is more challenging."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Chris Romeo&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&amp;nbsp;Romeo said that everyone's zero-trust deployment is different.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Yes, they use the same principles and architecture patterns, but they are not the same. We cannot review and secure the reference architecture once and expect that we will be good to go in perpetuity. [No] reference architectures exist in the real world."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Chris Romeo&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Parekh said implementing a zero-trust architecture can introduce complexity, given the need for granular access controls, micro-segmentation, and continuous monitoring.&lt;/p&gt; 
&lt;p&gt;And there are always the difficulties that come with any initiative that introducing change to the status quo in security organizations, especially spanning security operations (SecOps) and AppSec.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Implementing zero trust requires a shift in mindset and culture throughout the organization. Threat modelers may face resistance or challenges in gaining buy-in from stakeholders and ensuring consistent adoption of zero-trust principles across all teams and departments.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Dhaval Parekh&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;div&gt; 
    &lt;div&gt; 
     &lt;div&gt; 
      &lt;div&gt; 
       &lt;div&gt; 
        &lt;div&gt; 
         &lt;div&gt; 
          &lt;p&gt;Matt Rose, Field CISO at ReversingLabs, said the concept of zero trust is evolving, "just like &lt;a href="https://www.reversinglabs.com/the-evolution-of-application-security"&gt;the way modern software and applications are being developed is evolving&lt;/a&gt;."&lt;/p&gt; 
          &lt;blockquote&gt; 
           &lt;p&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;"The concept of zero trust needs to be a mindset above and beyond vulnerabilities, but take into account all aspects of the software and applications you develop internally and use from external sources."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
          &lt;/blockquote&gt; 
         &lt;/div&gt; 
        &lt;/div&gt; 
       &lt;/div&gt; 
      &lt;/div&gt; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fzero-trust-and-threat-modeling-is-it-time-for-appsec-to-get-on-board&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Threat Modeling</category>
      <pubDate>Wed, 15 Nov 2023 16:48:24 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/zero-trust-and-threat-modeling-is-it-time-for-appsec-to-get-on-board</guid>
      <dc:date>2023-11-15T16:48:24Z</dc:date>
    </item>
    <item>
      <title>8 CI/CD security best practices: Protect your software pipeline</title>
      <link>https://www.reversinglabs.com/blog/8-cicd-security-best-practices-software-pipeline</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/8-cicd-security-best-practices-software-pipeline" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/8-cicd-best-practices.png" alt="8 CI/CD best practices: Secure your software development pipeline" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;With CI/CD approaches to software development spreading ever more widely, the benefits are stacking up for many organizations. A recent &lt;a href="https://cdfound.lfprojects.linuxfoundation.org/wp-content/uploads/sites/78/2023/04/State-of-CD-Report-2023.pdf?hsCtaTracking=384e75b2-c04b-4574-af6f-6eb36f104412%7C3ea29835-eb0d-44e0-8a8e-579eed5a19c7"&gt;study&lt;/a&gt; by the Continuous Delivery Foundation (CDF) shows that developers who use continuous integration/continuous delivery (CI/CD) tools are more than twice as likely to be top performers in restoring service and also have the edge in both deployment frequency and lead time for code change.&lt;/p&gt; 
 &lt;p&gt;But the automation and complexity of CI/CD pipelines and processes can introduce significant security risks to the development process if organizations don't plan carefully. Not only do organizations need to ensure that security checks are built into the fast-paced workflow of CI/CD processes, but the tools and integrations of the CI/CD pipeline itself must also be protected.&lt;/p&gt; 
 &lt;p&gt;Here are eight best practices for hardening CI/CD build environments and baking security into the software pipeline.&lt;/p&gt; 
 &lt;p style="font-weight: bold;"&gt;[ Learn why legacy AppSec tools put your organization at risk: &lt;a href="https://www.reversinglabs.com/software-supply-chain-security-risk-report"&gt;The Software Supply Chain Security Risk Report&lt;/a&gt; ]&lt;/p&gt; 
 &lt;h2 style="font-weight: bold;"&gt;1. Reminder: CI/CD tooling is part of the supply chain&lt;/h2&gt; 
 &lt;p&gt;A &lt;a href="https://thehackernews.com/2023/09/critical-jetbrains-teamcity-flaw-could.html"&gt;critical flaw in the CI/CD tool JetBrains Team City&lt;/a&gt;&amp;nbsp;came to light this September was being&amp;nbsp;actively exploited by October. This highlights the importance of securing the CI/CD pipeline.&lt;/p&gt; 
 &lt;p&gt;A key fundamental to CI/CD security is remembering that CI/CD tooling is as much a part of the software supply chain as any open-source component that goes into the code.&lt;/p&gt; 
 &lt;p&gt;The JetBrains flaw, a remote code execution (RCE) vulnerability accessible to nonauthenticated users, garnered a 9.8 CVSS rating. It was actively exploited by multiple North Korean threat actors within weeks of disclosure.&lt;br&gt;&lt;br&gt;Henrik Plate, security researcher for Endor Labs, said that exploiting the JetBrains vulnerability could provide attackers with access to secrets, source code, and other assets consumed or produced on the respective CI/CD system.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;"As such, it gives rise to supply chain attacks that have far-reaching consequences, not only for the organization running a vulnerable version of TeamCity, but for all users that download and execute software built on such a system."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/henrikplate/"&gt;Henrik Plate&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;As Plate noted, the latter is the worst-case scenario, where attackers quietly manipulate software created by flawed tooling such as TeamCity to create legitimate-looking but malware-infected software.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This underlines to what extent the security of today’s software depends on the security of upstream dependencies of all kinds, not only embedded components — those that become part of the actual software product — but also all the other components used throughout the software development lifecycle, from code to cloud."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Henrik Plate&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Harman Singh, director at cybersecurity firm Cyphere, said that means you must keep track of updates, vulnerabilities, and dependency problems within CI/CD tooling just as you would for any other software.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p&gt;&lt;span style="color: black; font-style: italic;"&gt;&lt;span style="font-size: 24px;"&gt;"By keeping dependencies up to date, organizations can mitigate the risk of exploiting known vulnerabilities. By keeping dependencies up to date, organizations can mitigate the risk of attackers exploiting known vulnerabilities."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/harman12/"&gt;Harman Singh&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Liav Caspi, CTO of Legit Security, said that organizations should also be verifying the security and integrity of the components, plug-ins, the GitHub Actions, and all of the other code that comprises the pipeline.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"Verify the build components you're using. Make sure you use verified components and not something shady that you don't know what's running in it."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/liav-caspi-67b10647/" style="font-style: italic;"&gt;Liav Caspi&lt;/a&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2 style="font-weight: bold;"&gt;2. Tighten up access control and secrets management&lt;/h2&gt; 
 &lt;p&gt;One of the biggest mistakes that organizations make in securing their CI/CD pipeline is neglecting to implement strong access controls, said Singh.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"By failing to restrict access to sensitive resources, they expose themselves to potential breaches and unauthorized modifications. To avoid this, organizations should enforce the principle of least privilege, granting only the necessary permissions to individuals or systems involved in the pipeline."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Harman Singh&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Not only should organizations be enforcing the rule of least privilege within CI/CD tooling, but they should also ensure that they're using multifactor authentication wherever available. "By requiring multifactor authentication for all users accessing the pipeline, organizations significantly reduce the risk of unauthorized access and potential data breaches," Singh said. "This simple step adds an extra layer of security to the pipeline."&lt;/p&gt; 
 &lt;p&gt;Part and parcel with all of this is the role of strong secrets management. Viktor Gazdag, managing security consultant for NCC Group, said that some of the biggest exposures and integrity problems within the CI/CD pipeline have to do with &lt;a href="https://www.reversinglabs.com/blog/plugging-secrets-leaks-requires-protecting-the-full-software-and-technolgy-stack"&gt;insecure handling of secrets&lt;/a&gt;, including hardcoded credentials and poorly secured stores of credentials in development environments.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"The scope and storage of the secrets are also often overlooked and misconfigured, allowing everyone or a wider audience to access them."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/viktor-gazdag-78620231/?originalSubdomain=uk" style="font-style: italic;"&gt;Viktor Gazdag&lt;/a&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2 style="font-weight: normal;"&gt;3. Build security monitoring and telemetry into the pipeline&lt;/h2&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Vladislav Bilay, DevOps engineer for Aquiva Labs, said that&lt;/span&gt; for organizations seeking to level up their AppSec chops and maintain the integrity of their CI/CD pipeline, visibility is crucial. &lt;span style="color: black;"&gt;C&lt;/span&gt;&lt;span style="color: black;"&gt;ontinuous monitoring and feedback mechanisms are paramount, as is establishing a robust feedback loop for security information across the entire pipeline, Bilay said. That allows teams to detect and respond to potential vulnerabilities in real time.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="color: black; font-style: italic;"&gt;"However, this requires a shift in mindset from periodic security assessments to an ongoing, integrated monitoring approach, demanding commitment and adaptability from DevSecOps teams."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/vladislav-bilay/?originalSubdomain=pl"&gt;Vladislav Bilay&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Yash Mestry, DevOps and security associate for Perpetual, said pipeline observability is huge in the era of cloud-native development and deployment.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="color: black; font-style: italic;"&gt;"To understand the dynamic and dispersed nature of cloud-native systems, powerful observability and monitoring capabilities are needed. To do this, logs, metrics, and traces from multiple application components must be gathered and examined for signs of security threats and anomalies."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/yash-mestry-65b290181/"&gt;Yash Mestry&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Mestry explained that to securely make the transition from traditional &lt;/span&gt;&lt;span style="color: black;"&gt;application development to CI/CD and cloud-native development environments, organizations have to rethink their security telemetry and tooling to bring build visibility into the pipeline.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"Tooling must be flexible, automated, and capable of interfacing with the DevOps pipeline in order to support a cloud-native approach. In order to do so, security testing tools that connect with container orchestration systems, vulnerability scanners for container images, and security-as-code frameworks for automating security policies may be used."&lt;br&gt;—Yash Mestry&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;4. Security as code is key&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;The practice of building systems and configuration controls into the CI/CD pipeline that make it easier for developers to make sound choices in how they code, deploy, and run software is a no-brainer for AppSec risk reduction — whether you call that "developer guardrails," "security as code," or "Secure by Default." Rather than just teaching developers about security best practices, the best DevOps teams also set and implement security policies through code and configuration that’s built directly into the pipeline and underlying software infrastructure.&lt;/p&gt; 
 &lt;p&gt;Derek Fisher, author of the &lt;span style="font-style: italic;"&gt;Application Security Program Handbook,&lt;/span&gt; said in a recent interview on the &lt;a href="https://www.securityjourney.com/post/how-security-can-create-guardrails-not-barriers-for-developers"&gt;Security Champions Podcast&lt;/a&gt; that it is ultimately about ensuring that engineers have the ability to develop code normally but with the confidence that they're secure.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="color: black; font-style: italic;"&gt;"In terms of being able to deploy, you have your infrastructure as code developed in such a way that it ensures that you don't have things like configuration drift and that it follows best practices and patterns and nobody's allowed to tamper with that. So I think there's ways that we can build that paved road, those guardrails, to ensure that developers are just focusing on making sure that their code gets out the door on time."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/derek-fisher-sec-arch/"&gt;Derek Fisher&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;And when security as code is developed, the security team should be coming up with the policies in close collaboration with the developers, and in many instances the engineers may end up being the ones who develop the code that enforces guardrails on the daily. &lt;span style="color: black;"&gt;Application security is the sidecar to development, and that means it rides along with the engineers as they're building software, Fisher said.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"What I've found is that my team and the application security individuals that I've worked with are not always the ones coming up with the best solution. To be honest, the security teams are not going to know the full technical stack that the engineers are developing their software on. They may know enough to be dangerous, but they're not going to know all of those languages and all the nuances and the exact way to solve the problem in four different languages."&lt;br&gt;—Derek Fisher&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;5. Security gates are critical&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;A part of the process of setting up guardrails is enforcing the mentality of testing early and often — and integrating those assessment processes directly within the CI/CD pipeline, Fisher added. Establishing security gates and embedding them into the integration and deployment workflow is the bedrock for CI/CD security and improved AppSec performance.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"We need paved roads in existence from a security standpoint where your pipeline has appropriate scanning tools built in at the right times and a feedback loop back to development teams. It's not going to clear a gate with either a certain number or certain level of vulnerabilities, whether critical or high. Full stop."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Derek Fisher&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;It's not as if this is a new or foreign concept for developers. "&lt;span style="color: black;"&gt;This honestly isn't much different than the way that we have the different guardrails in place to make sure that there's quality built into the development," Fisher said. &lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"You have unit tests, you have system tests, you have integration tests, and those are all there to ensure that defects are caught as quickly as possible and that the engineer or the development team is able to fix those and get them back out the door as soon as possible."&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;br&gt;—Derek Fisher&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;6. Shore up your secure code signing&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;As threat actors increasingly target code-signing certificates to stealthily circumvent integrity checking of software code, development teams are going to have to do more to shore up the security of their code-signing processes. Christian Simko, vice president at AppViewX, said this is the gist of the new &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://cabforum.org/wp-content/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v3.2.pdf"&gt;Code Signing Baseline Requirements&lt;/a&gt;&lt;/span&gt;&lt;span style="color: black;"&gt; issued by the CA/B Forum this year, delineating secure hardware for generating and storing private keys to prevent key compromises. These guidelines should be used to update code-signing practices.&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Simko is an advocate for centralizing code signing, which has traditionally been distributed &lt;/span&gt;across different development teams and which also has not been very DevOps- or CI/CD tooling–friendly.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="font-size: 24px;"&gt;"This often leads to the use of multiple code-signing tools by different developers and insecure code-signing keys. To overcome this challenge and support the needs of development teams, organizations should implement a centralized code-signing model. This approach can be used to enforce code-signing best practices, integrate code signing into the CI/CD pipeline, and keep code-signing keys secure. It also modernizes code signing for scalability, efficiency, and agility."&amp;nbsp; &lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;—&lt;a href="https://www.linkedin.com/in/csimko/"&gt;&lt;span style="color: black;"&gt;Christian Simko&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;7. Store software artifacts sanely&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;As security teams bolster the security testing, monitoring, and dependency tracking of software as it works its way through the CI/CD pipeline, they're going to be generating an increasingly growing mountain of security artifacts. This can become a data management and analysis nightmare without the right systems in place to sanely store the evidence, said Steve Taylor, CTO for DeployHub and a board member of CDF, in a &lt;a href="https://www.youtube.com/watch?v=LpMBBnfPCYo"&gt;recent presentation.&lt;/a&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"We can't keep track of that in our head. So we need to push this information somewhere, and that's where we need to store the evidence."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/steve-taylor-oms/" style="font-style: italic;"&gt;Steve Taylor&lt;/a&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Taylor said that publishing security artifacts coming out of the build process into aggregated registry tools such as ArtifactHub, DockerHub, Quay, Maven Central, npm, or Pypi is crucial to making sense out of it all.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Some of these registries are being extended to store any type of artifact. That's going to allow us to have a one-stop shop for managing all of these artifacts and getting the information about them from there."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Steve Taylor&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;8. Don't forget to threat-model the pipeline&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;Threat modeling isn't just for software that runs through the CI/CD pipeline. Build environment components and the entire pipeline as it is deployed should also be put through their paces, said NCC Group's Gazdag. He encourages organizations to adopt a continuous threat modeling approach to CI/CD environments to keep an eye out for insecurities in connection boundaries, connecting components, and data flows.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This will allow an organization to see the big picture with gaps and blind spots, so they can put in place the correct preventive and security controls. For example, developers can see where a credential is stored, where it is used, where it came from, how it’s stored, and who can access it."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Viktor Gazdag&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;The call to action&lt;/h2&gt; 
 &lt;p&gt;&lt;span style="color: #1f1f1f; font-size: 18px; background-color: transparent;"&gt;With attackers &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/nvd-analysis-2022-why-you-need-to-modernize-your-software-security-approach" style="font-size: 18px; background-color: transparent;"&gt;increasingly turning their eye to development environments&lt;/a&gt;&lt;span style="color: #1f1f1f; font-size: 18px; background-color: transparent;"&gt;, organizations must take measures to prevent attackers from infiltrating CI/CD infrastructure to keep them from not only breaching the organization but also introducing dangerous flaws into their applications.&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 12px;"&gt;This blog post is an updated version of a 2022 story on CI/CD best practices that reflects the latest insights.&lt;/span&gt;&lt;br&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div&gt; 
 &lt;p style="font-weight: bold;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/8-cicd-best-practices.png?width=1400&amp;amp;height=732&amp;amp;name=8-cicd-best-practices.png" alt="8-cicd-best-practices" width="1400" height="732" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
 &lt;p&gt;With CI/CD approaches to software development spreading ever more widely, the benefits are stacking up for many organizations. A recent &lt;a href="https://cdfound.lfprojects.linuxfoundation.org/wp-content/uploads/sites/78/2023/04/State-of-CD-Report-2023.pdf?hsCtaTracking=384e75b2-c04b-4574-af6f-6eb36f104412%7C3ea29835-eb0d-44e0-8a8e-579eed5a19c7"&gt;study&lt;/a&gt; by the Continuous Delivery Foundation (CDF) shows that developers who use continuous integration/continuous delivery (CI/CD) tools are more than twice as likely to be top performers in restoring service and also have the edge in both deployment frequency and lead time for code change.&lt;/p&gt; 
 &lt;p&gt;But the automation and complexity of CI/CD pipelines and processes can introduce significant security risks to the development process if organizations don't plan carefully. Not only do organizations need to ensure that security checks are built into the fast-paced workflow of CI/CD processes, but the tools and integrations of the CI/CD pipeline itself must also be protected.&lt;/p&gt; 
 &lt;p&gt;Here are eight best practices for hardening CI/CD build environments and baking security into the software pipeline.&lt;/p&gt; 
 &lt;p style="font-weight: bold;"&gt;[ Learn why legacy AppSec tools put your organization at risk: &lt;a href="https://www.reversinglabs.com/software-supply-chain-security-risk-report"&gt;The Software Supply Chain Security Risk Report&lt;/a&gt; ]&lt;/p&gt; 
 &lt;h2 style="font-weight: bold;"&gt;1. Reminder: CI/CD tooling is part of the supply chain&lt;/h2&gt; 
 &lt;p&gt;A &lt;a href="https://thehackernews.com/2023/09/critical-jetbrains-teamcity-flaw-could.html"&gt;critical flaw in the CI/CD tool JetBrains Team City&lt;/a&gt;&amp;nbsp;came to light this September was being&amp;nbsp;actively exploited by October. This highlights the importance of securing the CI/CD pipeline.&lt;/p&gt; 
 &lt;p&gt;A key fundamental to CI/CD security is remembering that CI/CD tooling is as much a part of the software supply chain as any open-source component that goes into the code.&lt;/p&gt; 
 &lt;p&gt;The JetBrains flaw, a remote code execution (RCE) vulnerability accessible to nonauthenticated users, garnered a 9.8 CVSS rating. It was actively exploited by multiple North Korean threat actors within weeks of disclosure.&lt;br&gt;&lt;br&gt;Henrik Plate, security researcher for Endor Labs, said that exploiting the JetBrains vulnerability could provide attackers with access to secrets, source code, and other assets consumed or produced on the respective CI/CD system.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;"As such, it gives rise to supply chain attacks that have far-reaching consequences, not only for the organization running a vulnerable version of TeamCity, but for all users that download and execute software built on such a system."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/henrikplate/"&gt;Henrik Plate&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;As Plate noted, the latter is the worst-case scenario, where attackers quietly manipulate software created by flawed tooling such as TeamCity to create legitimate-looking but malware-infected software.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This underlines to what extent the security of today’s software depends on the security of upstream dependencies of all kinds, not only embedded components — those that become part of the actual software product — but also all the other components used throughout the software development lifecycle, from code to cloud."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Henrik Plate&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Harman Singh, director at cybersecurity firm Cyphere, said that means you must keep track of updates, vulnerabilities, and dependency problems within CI/CD tooling just as you would for any other software.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p&gt;&lt;span style="color: black; font-style: italic;"&gt;&lt;span style="font-size: 24px;"&gt;"By keeping dependencies up to date, organizations can mitigate the risk of exploiting known vulnerabilities. By keeping dependencies up to date, organizations can mitigate the risk of attackers exploiting known vulnerabilities."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/harman12/"&gt;Harman Singh&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Liav Caspi, CTO of Legit Security, said that organizations should also be verifying the security and integrity of the components, plug-ins, the GitHub Actions, and all of the other code that comprises the pipeline.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"Verify the build components you're using. Make sure you use verified components and not something shady that you don't know what's running in it."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/liav-caspi-67b10647/" style="font-style: italic;"&gt;Liav Caspi&lt;/a&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2 style="font-weight: bold;"&gt;2. Tighten up access control and secrets management&lt;/h2&gt; 
 &lt;p&gt;One of the biggest mistakes that organizations make in securing their CI/CD pipeline is neglecting to implement strong access controls, said Singh.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"By failing to restrict access to sensitive resources, they expose themselves to potential breaches and unauthorized modifications. To avoid this, organizations should enforce the principle of least privilege, granting only the necessary permissions to individuals or systems involved in the pipeline."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Harman Singh&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Not only should organizations be enforcing the rule of least privilege within CI/CD tooling, but they should also ensure that they're using multifactor authentication wherever available. "By requiring multifactor authentication for all users accessing the pipeline, organizations significantly reduce the risk of unauthorized access and potential data breaches," Singh said. "This simple step adds an extra layer of security to the pipeline."&lt;/p&gt; 
 &lt;p&gt;Part and parcel with all of this is the role of strong secrets management. Viktor Gazdag, managing security consultant for NCC Group, said that some of the biggest exposures and integrity problems within the CI/CD pipeline have to do with &lt;a href="https://www.reversinglabs.com/blog/plugging-secrets-leaks-requires-protecting-the-full-software-and-technolgy-stack"&gt;insecure handling of secrets&lt;/a&gt;, including hardcoded credentials and poorly secured stores of credentials in development environments.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"The scope and storage of the secrets are also often overlooked and misconfigured, allowing everyone or a wider audience to access them."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/viktor-gazdag-78620231/?originalSubdomain=uk" style="font-style: italic;"&gt;Viktor Gazdag&lt;/a&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2 style="font-weight: normal;"&gt;3. Build security monitoring and telemetry into the pipeline&lt;/h2&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Vladislav Bilay, DevOps engineer for Aquiva Labs, said that&lt;/span&gt; for organizations seeking to level up their AppSec chops and maintain the integrity of their CI/CD pipeline, visibility is crucial. &lt;span style="color: black;"&gt;C&lt;/span&gt;&lt;span style="color: black;"&gt;ontinuous monitoring and feedback mechanisms are paramount, as is establishing a robust feedback loop for security information across the entire pipeline, Bilay said. That allows teams to detect and respond to potential vulnerabilities in real time.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="color: black; font-style: italic;"&gt;"However, this requires a shift in mindset from periodic security assessments to an ongoing, integrated monitoring approach, demanding commitment and adaptability from DevSecOps teams."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/vladislav-bilay/?originalSubdomain=pl"&gt;Vladislav Bilay&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Yash Mestry, DevOps and security associate for Perpetual, said pipeline observability is huge in the era of cloud-native development and deployment.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="color: black; font-style: italic;"&gt;"To understand the dynamic and dispersed nature of cloud-native systems, powerful observability and monitoring capabilities are needed. To do this, logs, metrics, and traces from multiple application components must be gathered and examined for signs of security threats and anomalies."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/yash-mestry-65b290181/"&gt;Yash Mestry&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Mestry explained that to securely make the transition from traditional &lt;/span&gt;&lt;span style="color: black;"&gt;application development to CI/CD and cloud-native development environments, organizations have to rethink their security telemetry and tooling to bring build visibility into the pipeline.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"Tooling must be flexible, automated, and capable of interfacing with the DevOps pipeline in order to support a cloud-native approach. In order to do so, security testing tools that connect with container orchestration systems, vulnerability scanners for container images, and security-as-code frameworks for automating security policies may be used."&lt;br&gt;—Yash Mestry&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;4. Security as code is key&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;The practice of building systems and configuration controls into the CI/CD pipeline that make it easier for developers to make sound choices in how they code, deploy, and run software is a no-brainer for AppSec risk reduction — whether you call that "developer guardrails," "security as code," or "Secure by Default." Rather than just teaching developers about security best practices, the best DevOps teams also set and implement security policies through code and configuration that’s built directly into the pipeline and underlying software infrastructure.&lt;/p&gt; 
 &lt;p&gt;Derek Fisher, author of the &lt;span style="font-style: italic;"&gt;Application Security Program Handbook,&lt;/span&gt; said in a recent interview on the &lt;a href="https://www.securityjourney.com/post/how-security-can-create-guardrails-not-barriers-for-developers"&gt;Security Champions Podcast&lt;/a&gt; that it is ultimately about ensuring that engineers have the ability to develop code normally but with the confidence that they're secure.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="color: black; font-style: italic;"&gt;"In terms of being able to deploy, you have your infrastructure as code developed in such a way that it ensures that you don't have things like configuration drift and that it follows best practices and patterns and nobody's allowed to tamper with that. So I think there's ways that we can build that paved road, those guardrails, to ensure that developers are just focusing on making sure that their code gets out the door on time."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/derek-fisher-sec-arch/"&gt;Derek Fisher&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;And when security as code is developed, the security team should be coming up with the policies in close collaboration with the developers, and in many instances the engineers may end up being the ones who develop the code that enforces guardrails on the daily. &lt;span style="color: black;"&gt;Application security is the sidecar to development, and that means it rides along with the engineers as they're building software, Fisher said.&lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"What I've found is that my team and the application security individuals that I've worked with are not always the ones coming up with the best solution. To be honest, the security teams are not going to know the full technical stack that the engineers are developing their software on. They may know enough to be dangerous, but they're not going to know all of those languages and all the nuances and the exact way to solve the problem in four different languages."&lt;br&gt;—Derek Fisher&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;5. Security gates are critical&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;A part of the process of setting up guardrails is enforcing the mentality of testing early and often — and integrating those assessment processes directly within the CI/CD pipeline, Fisher added. Establishing security gates and embedding them into the integration and deployment workflow is the bedrock for CI/CD security and improved AppSec performance.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"We need paved roads in existence from a security standpoint where your pipeline has appropriate scanning tools built in at the right times and a feedback loop back to development teams. It's not going to clear a gate with either a certain number or certain level of vulnerabilities, whether critical or high. Full stop."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Derek Fisher&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;It's not as if this is a new or foreign concept for developers. "&lt;span style="color: black;"&gt;This honestly isn't much different than the way that we have the different guardrails in place to make sure that there's quality built into the development," Fisher said. &lt;/span&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="color: black;"&gt;"You have unit tests, you have system tests, you have integration tests, and those are all there to ensure that defects are caught as quickly as possible and that the engineer or the development team is able to fix those and get them back out the door as soon as possible."&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;br&gt;—Derek Fisher&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;6. Shore up your secure code signing&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;As threat actors increasingly target code-signing certificates to stealthily circumvent integrity checking of software code, development teams are going to have to do more to shore up the security of their code-signing processes. Christian Simko, vice president at AppViewX, said this is the gist of the new &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://cabforum.org/wp-content/uploads/Baseline-Requirements-for-the-Issuance-and-Management-of-Code-Signing.v3.2.pdf"&gt;Code Signing Baseline Requirements&lt;/a&gt;&lt;/span&gt;&lt;span style="color: black;"&gt; issued by the CA/B Forum this year, delineating secure hardware for generating and storing private keys to prevent key compromises. These guidelines should be used to update code-signing practices.&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span style="color: black;"&gt;Simko is an advocate for centralizing code signing, which has traditionally been distributed &lt;/span&gt;across different development teams and which also has not been very DevOps- or CI/CD tooling–friendly.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p&gt;&lt;span style="font-style: italic;"&gt;&lt;span style="font-size: 24px;"&gt;"This often leads to the use of multiple code-signing tools by different developers and insecure code-signing keys. To overcome this challenge and support the needs of development teams, organizations should implement a centralized code-signing model. This approach can be used to enforce code-signing best practices, integrate code signing into the CI/CD pipeline, and keep code-signing keys secure. It also modernizes code signing for scalability, efficiency, and agility."&amp;nbsp; &lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;span style="font-size: 24px; font-style: italic;"&gt;—&lt;a href="https://www.linkedin.com/in/csimko/"&gt;&lt;span style="color: black;"&gt;Christian Simko&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;7. Store software artifacts sanely&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;As security teams bolster the security testing, monitoring, and dependency tracking of software as it works its way through the CI/CD pipeline, they're going to be generating an increasingly growing mountain of security artifacts. This can become a data management and analysis nightmare without the right systems in place to sanely store the evidence, said Steve Taylor, CTO for DeployHub and a board member of CDF, in a &lt;a href="https://www.youtube.com/watch?v=LpMBBnfPCYo"&gt;recent presentation.&lt;/a&gt;&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"We can't keep track of that in our head. So we need to push this information somewhere, and that's where we need to store the evidence."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/steve-taylor-oms/" style="font-style: italic;"&gt;Steve Taylor&lt;/a&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;p&gt;Taylor said that publishing security artifacts coming out of the build process into aggregated registry tools such as ArtifactHub, DockerHub, Quay, Maven Central, npm, or Pypi is crucial to making sense out of it all.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Some of these registries are being extended to store any type of artifact. That's going to allow us to have a one-stop shop for managing all of these artifacts and getting the information about them from there."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Steve Taylor&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;&lt;strong&gt;8. Don't forget to threat-model the pipeline&lt;/strong&gt;&lt;/h2&gt; 
 &lt;p&gt;Threat modeling isn't just for software that runs through the CI/CD pipeline. Build environment components and the entire pipeline as it is deployed should also be put through their paces, said NCC Group's Gazdag. He encourages organizations to adopt a continuous threat modeling approach to CI/CD environments to keep an eye out for insecurities in connection boundaries, connecting components, and data flows.&lt;/p&gt; 
 &lt;blockquote&gt; 
  &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This will allow an organization to see the big picture with gaps and blind spots, so they can put in place the correct preventive and security controls. For example, developers can see where a credential is stored, where it is used, where it came from, how it’s stored, and who can access it."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Viktor Gazdag&lt;/em&gt;&lt;/p&gt; 
 &lt;/blockquote&gt; 
 &lt;h2&gt;The call to action&lt;/h2&gt; 
 &lt;p&gt;&lt;span style="color: #1f1f1f; font-size: 18px; background-color: transparent;"&gt;With attackers &lt;/span&gt;&lt;a href="https://www.reversinglabs.com/blog/nvd-analysis-2022-why-you-need-to-modernize-your-software-security-approach" style="font-size: 18px; background-color: transparent;"&gt;increasingly turning their eye to development environments&lt;/a&gt;&lt;span style="color: #1f1f1f; font-size: 18px; background-color: transparent;"&gt;, organizations must take measures to prevent attackers from infiltrating CI/CD infrastructure to keep them from not only breaching the organization but also introducing dangerous flaws into their applications.&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 12px;"&gt;This blog post is an updated version of a 2022 story on CI/CD best practices that reflects the latest insights.&lt;/span&gt;&lt;br&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F8-cicd-security-best-practices-software-pipeline&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dev &amp; DevSecOps</category>
      <category>CI/CD Security</category>
      <pubDate>Tue, 14 Nov 2023 14:00:00 GMT</pubDate>
      <author>ericka@chickowski.com (Ericka Chickowski)</author>
      <guid>https://www.reversinglabs.com/blog/8-cicd-security-best-practices-software-pipeline</guid>
      <dc:date>2023-11-14T14:00:00Z</dc:date>
    </item>
    <item>
      <title>How supply chain security tools can protect ML models</title>
      <link>https://www.reversinglabs.com/blog/ai-and-transparency-how-ml-model-creators-can-protect-against-supply-chain-attacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/ai-and-transparency-how-ml-model-creators-can-protect-against-supply-chain-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/transparency-ai-light-window-slsa-sigstore.jpg" alt="AI needs transparency: How software supply chain security tools can help secure ML models" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;Solutions designed to protect the software supply chain can also be used to protect machine-learning (ML) models from similar attacks.Two such solutions are the Supply-chain Levels for Software Artifacts (SLSA) framework and Sigstore.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/transparency-ai-light-window-slsa-sigstore.jpg?width=1400&amp;amp;height=732&amp;amp;name=transparency-ai-light-window-slsa-sigstore.jpg" width="1400" height="732" alt="transparency-ai-light-window-slsa-sigstore" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;Solutions designed to protect the software supply chain can also be used to protect machine-learning (ML) models from similar attacks.Two such solutions are the Supply-chain Levels for Software Artifacts (SLSA) framework and Sigstore.&lt;/p&gt;  
&lt;p&gt;SLSA (pronounced "salsa") is a security framework — a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure. Sigstore is an open-source project focused on improving supply chain security by providing a framework and tooling for securely signing and verifying software artifacts, including release files, container images, binaries, and software bills of materials (SBOMs).&lt;/p&gt; 
&lt;p&gt;Mihai Maruseac, Sarah Meiklejohn, and Mark Lodato argued in a recent &lt;a href="https://security.googleblog.com/2023/10/increasing-transparency-in-ai-security.html"&gt;&lt;span&gt;post&lt;/span&gt; on the Google Security Blog&lt;/a&gt; that ML model makers should extend their use of the software supply chain security tools to protect ML supply chains from attack. Using Sigstore, ML model builders can sign a model so that anyone using it can be confident it's the exact one the builder, or trainer, created. The team noted:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Signing models discourages model hub owners from swapping models, addresses the issue of a model hub compromise, and can help prevent users from being tricked into using a bad model."&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Meanwhile, SLSA — used to describe how a software artifact is built and implements controls to prevent tampering — can be used to provide information not covered in ML model signing, such as a compromised source control or training process, and vulnerability injection. The team wrote:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Our vision is to include specific ML information in a SLSA provenance file, which would help users spot an undertrained model or one trained on bad data. Upon detecting a vulnerability in an ML framework, users can quickly identify which models need to be retrained, thus reducing costs."&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;While the tools are a great first step for securing AI applications, they're not a complete solution. Here's what your security team needs to know about using SLSA and Sigstore to secure ML models.&lt;/p&gt; 
&lt;h2 style="font-weight: normal;"&gt;Understand the limits of digital signatures&lt;/h2&gt; 
&lt;p&gt;Digital signatures, when used correctly, can ensure that software, including AI platforms, have not been tampered with, said ReversingLabs field CISO Matt Rose. But signatures are no panacea.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;“The problem is that the data of the AI platform is typically not secured in the same way. You need to worry about the supply chain for the software itself and the data it uses to function.”&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/mattarose/" style="font-style: italic;"&gt;Matt &amp;nbsp;Rose&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Steve Wilson, chief product officer for Exabeam, said that by integrating digital signatures into AI development and deployment processes, organizations can significantly enhance the security and trustworthiness of their ML models and the data they are built upon. This, in turn, contributes to the broader goal of ensuring responsible and trustworthy AI systems&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;“While digital signatures are a powerful tool for enhancing supply chain security, they are not a panacea and come with certain limitations and challenges, particularly in AI and machine-learning models."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/wilsonsd/" style="font-style: italic;"&gt;Steve Wilson&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Wilson cited a number of issues associated with digital signatures and AI, including:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="font-weight: bold;"&gt;Complexity and overhead: &lt;/span&gt;Implementing digital signature systems can add complexity and overhead to the development and deployment processes. This includes the need for secure key management, signature verification mechanisms, and the computational resources required for signing and verifying signatures.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Key management:&amp;nbsp;&lt;/strong&gt;Securely managing the cryptographic keys used for digital signatures is a non-trivial task. If keys are compromised or mismanaged, the integrity and authenticity assurances of digital signatures could be undermined.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Limited scope: &lt;/strong&gt;Digital signatures ensure integrity and authenticity but do not address other crucial aspects of supply chain security such as confidentiality, privacy, or availability.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;False sense of security: &lt;/strong&gt;There might be a tendency to over-rely on digital signatures, leading to a false sense of security. Digital signatures can verify that a model or dataset has not been altered, but they cannot verify the intrinsic quality, fairness, or safety of the model or dataset.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Limited efficacy with training and dynamic data: &lt;/strong&gt;Digital signatures might provide a level of assurance for on-premises foundation models by verifying their integrity and authenticity. However, they are less likely to address the challenges associated with training data or dynamic data, such as the data used for retrieval-augmented generation (RAG). Training data, crucial for building and fine-tuning models, is often vast and dynamic, making it challenging to ensure its integrity and authenticity through digital signatures.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Similarly, dynamic data that is continuously changing or being updated can pose challenges for digital signature verification, since the signatures can become outdated rapidly. This limitation underscores the need for additional mechanisms and strategies to secure the training data and dynamic data that play a critical role in the performance and behavior of AI models, beyond the verification of static, foundational model artifacts.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Good — but not good enough&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Sigstore and SLSA are great for what they were designed to do — which is to secure the software supply chain, Rose said.&lt;span&gt;&amp;nbsp; &lt;/span&gt;But he said the problem is that even if the AI software package itself is not compromised, the data that the AI platform uses may still be tainted.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“These approaches need to be extended beyond just securing the software itself.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span&gt;Exabeam‘s &lt;/span&gt;Wilson said that the nuanced nature of ML systems brings about a distinct set of challenges and considerations regarding supply chain security. He said t&lt;span style="background-color: transparent;"&gt;he SLSA framework serves as a solid foundation, but adapting it to the unique landscapes of AI and large language models (LLMs) requires a deeper level of contemplation and, potentially, the evolution of the framework itself, he explained.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“While SLSA lays a strong groundwork for supply chain security, the distinctive aspects of AI systems call for a tailored approach. This might involve extending SLSA, integrating it with other standards like ML-BOM, and fostering a broader understanding and community engagement to ensure supply chain security in the rapidly evolving landscape of AI and large language models.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Steve Wilson&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Jeremy Newberry, a cybersecurity architect and strategist with Merlin Cyber, said that&amp;nbsp; SLSA and Sigstore are good starts to the overall requirements, but they don’t answer the question for growing or self-improvement.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“They feel like a legacy approach to a new problem, and I believe a more modular and adaptive approach needs to be taken."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/jeremynewberry/"&gt;Jeremy Newberry&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;True transparency is key&lt;/h2&gt; 
&lt;p&gt;Google’s approach to AI supply chain security is a good first step toward securing ML models, but it's a fundamentally flawed approach, said Merlin Cyber solutions engineer Dean Webb.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The Foundation Model Transparency Index rated Google’s AI at only 40% transparent, so we need more from the AI vendors than their instructions on how we, the customers, can shoulder the full security load. We need their transparency and cooperation in sharing that security load.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/zzzptm/"&gt;Dean Webb&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fai-and-transparency-how-ml-model-creators-can-protect-against-supply-chain-attacks&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Artificial Intelligence (AI)/Machine Learning (ML)</category>
      <pubDate>Thu, 09 Nov 2023 12:00:00 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/ai-and-transparency-how-ml-model-creators-can-protect-against-supply-chain-attacks</guid>
      <dc:date>2023-11-09T12:00:00Z</dc:date>
    </item>
    <item>
      <title>OWASP Top 10 for LLM update bridges gap between AppSec and AI</title>
      <link>https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/owasp-top10-llm-break-back.jpg" alt="OWASP Top 10 for LLM update: Keeping up with AI is key" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="background-color: transparent;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/owasp-top10-llm-break-back.jpg?width=1400&amp;amp;height=732&amp;amp;name=owasp-top10-llm-break-back.jpg" width="1400" height="732" alt="owasp-top10-llm-break-back" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p style="text-align: left;"&gt;&lt;span style="background-color: transparent;"&gt;The first revamp of the &lt;span style="background-color: transparent;"&gt;&lt;span&gt;OWASP&lt;/span&gt;&lt;/span&gt; Top 10 for LLM Applications has been released&lt;span&gt;.&lt;/span&gt;&amp;nbsp;With only minor changes, &lt;/span&gt;&lt;a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/" style="background-color: transparent;"&gt;version 1.1&lt;/a&gt;&lt;span style="background-color: transparent;"&gt; of the &lt;span style="background-color: transparent;"&gt;O&lt;span style="background-color: transparent;"&gt;&lt;span&gt;pen Worldwide Application Security Project's list of key vulnerabilities &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;continues to advance the project team's goal of bridging the divide between general application security principles and the challenges posed by LLMs.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;To achieve that bridge, OWASP added a visual illustration of the data flow in a typical LLM application to highlight the potential areas of risk from vulnerabilities. For example, the data flow between an API and an LLM's production services could be vulnerable to a prompt injection or a denial-of-service attack, or an application's plugins might contain excessive vulnerabilities.&lt;/p&gt; 
&lt;p&gt;Generative AI is advancing at a breakneck pace. To keep it from breaking your organization's back, here's a full rundown on the changes in the OWASP Top 10 for LLMs, a starting point for your dev and AppSec teams to get a handle on generative AI.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See Webinar: &lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design: Why Trust Matters for Risk Management&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Mapping out LLM risk: Go with the flow chart&lt;/h2&gt; 
&lt;p&gt;OWASP has to work fast to keep up with the changes in LLM technology; &lt;a href="https://www.reversinglabs.com/blog/owasp-readies-top-10-for-llm-app-sec-risk-what-your-software-team-needs-to-know"&gt;version 1.0 of the Top 10 for LLMs was released only in August&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Chris Romeo, CEO of the threat modeling company Devici, said the inclusion of the LLM application data flow chart is the most significant change in the new version.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"The data flow provides a reference architecture to help readers understand how LLM systems are assembled. Without that context, it is more challenging to understand how the LLM Top 10 risks fit together."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/securityjourney/"&gt;Chris Romeo&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;OWASP Top 10 for LLM project leader Steve Wilson, also chief product officer of Exabeam, said the language describing the risks, as well as the examples accompanying them, have been cleaned up and clarified.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Some people were confused about the differences between some of the risks. For example, insecure output handling and excessive agency used some similar examples, although different vulnerabilities were at their core."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/wilsonsd/"&gt;Steve Wilson&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;Prompt injection and output handling enhanced&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The new version of the Top 10 for LLMs also increases clarity around the descriptions and manifestations within LLM architectures for prompt injection and insecure output handling. Dan Hopkins, vice president of engineering at the API security testing firm StackHawk, said this move was essential.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"Those tests will prove to be very visible to a user and demand targeted fuzzing at runtime for effective assessment."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/bolderdanh/"&gt;Dan Hopkins&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;A step in the right direction on securing AI&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Version 1.1&amp;nbsp; is "a significant step in the right direction,” said Hopkins. “It’s great to see version 1.1 placing a strong emphasis on enhancing the clarity and understanding of vulnerabilities within an LLM-based architecture.”&lt;/p&gt; 
&lt;p&gt;“The dataflow specifically does an amazing job highlighting where vulnerabilities exist in the stack, making it abundantly clear why black-box testing of a running application is essential for secure LLM usage,” he added.&lt;/p&gt; 
&lt;p&gt;The security community is still learning about the wide range of AI capabilities, and the OWASP Top 10 LLM 1.1 reflects that, observed Priyadharshini Parthasarathy, senior security consultant for application security at Coalfire.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“The new version includes a lot of detailed information on LLM-specific terms such as 'pre-training data,' the embedding process, and fine-tuning of data on how the models are being trained. &lt;span style="background-color: transparent;"&gt;This document also updated the list of scenario examples and references in the prevention and mitigation strategies."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/priyadharshini-p-628760a6/"&gt;Priyadharshini Parthasarathy&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;Top 10 risks remain constant&amp;nbsp;&lt;/h2&gt; 
&lt;p&gt;The top 10 risks in the latest version of the list remain unchanged from v1.0:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;LLM01: Prompt injection—&lt;/strong&gt;Used to manipulate an LLM&lt;span&gt;&amp;nbsp;&lt;/span&gt;through &lt;span style="background-color: transparent;"&gt;crafty inputs, causing unintended actions.&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM02: Insecure output handling—&lt;/strong&gt;Occurs when an LLM output is accepted &lt;span style="background-color: transparent;"&gt;without scrutiny, exposing backend systems.&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM03: Training data poisoning—&lt;/strong&gt;Occurs when LLM training data is tampered with, introducing vulnerabilities or biases that compromise security, effectiveness, or ethical behavior.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM04: Model denial of service—&lt;/strong&gt;Happens when attackers cause resource-heavy operations on LLMs, leading to service degradation or high costs.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM05: Supply chain vulnerabilities—&lt;/strong&gt;Can manifest&amp;nbsp;when an application’s lifecycle is compromised by vulnerable components or services.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM06: Sensitive information disclosure—&lt;/strong&gt;Can arise when an LLM inadvertently reveals confidential data in its responses.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM07: Insecure plugin design—&lt;/strong&gt;Results in plugins with insecure inputs and insufficient access control, leading to consequences such as remote code execution.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM08: Excessive agency—&lt;/strong&gt;Surfaces when excessive functionality, permissions, or autonomy is granted to LLM-based systems.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;LLM09: Overreliance—&lt;/strong&gt;Crops up when systems or people become overly dependent on LLMs without oversight.&lt;/li&gt; 
 &lt;li&gt;LLM10:&lt;strong&gt; Model theft—&lt;/strong&gt;Involves unauthorized access, copying, or exfiltration of proprietary LLM models.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2&gt;&lt;strong&gt;OWASP Top 10 for LLM: The next generation&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Future versions of the OWASP Top 10 for LLMs will need to evolve with the gen AI field itself, security experts note.&amp;nbsp;Devici's Romeo said that he, for one, wants the document to include threat language for each of the Top 10 items.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span style="background-color: transparent;"&gt;“The document contains vulnerability examples today, but threat examples would provide direct input into the threat modeling of LLM applications.”&lt;br&gt;—Chris Romeo&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;StackHawk's Hopkins said it would also be great to expand the Top 10 for LLMs' procedures for ensuring the absence of vulnerabilities.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Adding detailed descriptions that highlight AppSec techniques and their suitability for mitigating and preventing various vulnerabilities within the context of a sample architecture would be incredibly beneficial.”&lt;br&gt;&lt;span style="font-size: 24px;"&gt;—Dan Hopkins&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Michael Erlihson, a principal data scientist at the API security company Salt Security, suggested that the vulnerability descriptions in the list should be expanded in a future version. Including mitigation strategies for each vulnerability would also be worthwhile for developers and security teams, he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“More detailed descriptions and examples of each listed vulnerability could help practitioners better understand the risks involved."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/michael-mike-erlihson-phd-8208616/"&gt;Michael Erlihson&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Erlihson also suggested including industry-specific guidance in the list, as well as historical data on the vulnerabilities. “Historical data on how the vulnerabilities have evolved over time could provide insights into emerging threats and trends,” he said.&lt;/p&gt; 
&lt;p&gt;OWASP Top 10 for LLMs project leader Wilson said OWASP is planning two major deliverables in the near future, as well as additional rigor:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;International language versions of the list—&lt;/strong&gt;“We're working on translating the list into 10 languages,” Wilson said. “We're almost done with Chinese and Hindi, which will allow a lot of software developers to consume this. We're looking to publish a bunch of those in the next month.”&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;A companion document for CISOs, called the Checklist—&lt;/strong&gt;This document focuses on what needs to be considered as gen AI technologies are deployed in the enterprise. “We’re planning to have the first draft of that available for public comment in November,” Wilson said.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;More rigor on data gathering—&lt;/strong&gt;The aim here is to better highlight the likelihood and severity of risks to LLMs, Wilson said. “That's where we will almost certainly redefine some of the categories and change what's on the Top 10 list,” he said.&lt;/li&gt; 
&lt;/ul&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fowasp-top-10-for-llm-updated-to-keep-pace-with-ai&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Artificial Intelligence (AI)/Machine Learning (ML)</category>
      <pubDate>Tue, 07 Nov 2023 13:57:02 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/owasp-top-10-for-llm-updated-to-keep-pace-with-ai</guid>
      <dc:date>2023-11-07T13:57:02Z</dc:date>
    </item>
    <item>
      <title>TitaniumCloud app for Splunk SOAR updated</title>
      <link>https://www.reversinglabs.com/blog/reversinglabs-titaniumcloud-v2-v1.2.0-app-for-splunk-soar</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/reversinglabs-titaniumcloud-v2-v1.2.0-app-for-splunk-soar" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2.webp" alt="Reversinglabs TitaniumCloud v2 app for Splunk SOAR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;ReversingLabs has recently released version 1.2.0 of its TitaniumCloud app for Splunk SOAR. This release introduces our new network reputation action to help SOC teams identify malicious network indicators, increasing the count to a total of 33 available actions to improve your SOC team's efficiency. Here are the network reputation actions, and some example use cases.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2.webp?width=1400&amp;amp;height=732&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2.webp" width="1400" height="732" alt="Reversinglabs TitaniumCloud v2 (v1.2.0) App for Splunk SOAR" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;ReversingLabs has recently released version 1.2.0 of its TitaniumCloud app for Splunk SOAR. This release introduces our new network reputation action to help SOC teams identify malicious network indicators, increasing the count to a total of 33 available actions to improve your SOC team's efficiency. Here are the network reputation actions, and some example use cases.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-01.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-01.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-01.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;h2 style="font-weight: bold;"&gt;What’s new TitaniumCloud for Splunk SOAR 1.2.0&lt;/h2&gt; 
&lt;p&gt;This update mostly focuses on introducing our new network reputation APIs. Here are the new available actions:&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="color: #f6143f;"&gt;•&lt;/span&gt; Get network reputation: &lt;/span&gt;the Network Reputation API provides a classification of network-related indicators, including URLs, Domain names, and IP addresses.&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="color: #f6143f;"&gt;•&lt;/span&gt; Network reputation user override: &lt;/span&gt;this action enables TitaniumCloud users to override and set a classification value for a network indicator&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="color: #f6143f;"&gt;•&lt;/span&gt; Get list user overrides: &lt;/span&gt;this action returns a list of all overrides made by a given user&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="color: #f6143f;"&gt;•&lt;/span&gt; Get list user overrides aggregated: &lt;/span&gt;this action returns an aggregate of all overrides made by a given user&lt;/p&gt; 
&lt;p&gt;Continue reading to learn more about the network reputation capabilities of TitaniumCloud and how to effectively utilize the provided actions to automate the process of detecting and responding to network threats.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Network indicator reputation: Key for identifying malware&lt;/h2&gt; 
&lt;p&gt;Network reputation lookups are a new feature that we are excited to offer our TitaniumCloud customers. Where other solutions only provide a one-dimensional result, TitaniumCloud combines traditional reputation information with our massive repository of billions of files and powerful file analysis capabilities to help SOC teams identify malware.&amp;nbsp;&lt;br&gt;&lt;br&gt;In Splunk SOAR, using the new “get network reputation” action will provide SOC analysts with reputation information for IP addresses, domain names, and URLs. The screenshot below shows the formatted output of an IP address lookup:&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-02.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-02.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-02.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;It is easy for analysts to gain insight into the reputation of an IP address, domain, or URL by referring to the bar graph that displays classification values from third-party analysis engines. Additionally, if TitaniumCloud has detected any malware samples related to the indicator, a simple True or False value is provided for quick identification.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Playbook use case: Artifact enrichment&lt;/h2&gt; 
&lt;p&gt;This is a simple enrichment use case that will use the network reputation API to enrich all network indicators in a container. If any of the indicators are classified as malicious, the playbook will automatically update the severity of the container to High. Here’s what the playbook looks like when it’s finished:&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-03.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-03.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-03.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;The steps are pretty simple. First, create a filter that checks if the relevant artifact fields exist in the container:&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-04.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-04.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-04.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;By setting the condition to equal to true if the value of each artifact field isn’t empty, you can save on API calls in the event that the associated field isn’t present in an artifact. The next step is to call the network reputation action for each condition, using the associated artifact field as the network location input.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-05.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-05.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-05.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;Next, add a decision step that checks if the classification value is equal to malicious for any of the reputation lookups. This can be accomplished by providing the classification value from each of the previous “get network reputation” actions as input to the conditional:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="font-family: terminal, monospace;"&gt;&amp;lt;action_name&amp;gt;:action_result.data.0.rl.entries.0.classification&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;From here, add another action that will set the severity to “High” if any of the indicators are malicious, and do nothing if none of them are malicious.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-07.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-07.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-07.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;Using an enrichment playbook like this is a great way to help improve your SOC team's efficiency by focusing on the validated threats.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Playbook use case: IOC harvesting&lt;/h2&gt; 
&lt;p&gt;By utilizing the "get downloaded files" action within the enrichment playbook, it is possible to expand its capabilities even further. This action checks in with TitaniumCloud to determine if any files associated with a URL have been previously analyzed for malware. This feature is particularly useful for identifying additional indicators of compromise and for blocking potential threats.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-08.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-08.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-08.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;Simply adding the “network_locations” value from the previous network reputation action as input to the “get downloaded files” will return all files associated with the URL:&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-09.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-09.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-09.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;In this example, the supplied URL is hosting a single malicious PDF document. TitaniumCloud has already analyzed the file and determined it to also be malicious:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;span style="font-family: terminal, monospace;"&gt;&amp;lt;action_name&amp;gt;:action_result.parameter.network_locations&lt;/span&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The playbook in the previous use case can be further modified to take advantage of Splunk SOARs orchestration capabilities by integrating with your SIEM or EDR tool to check for instances of this document in the environment. The screenshot below shows an example of using Microsoft Defender for Endpoint’s Advanced Hunting query action to look for the associated SHA1 file hash:&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-11.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Reversinglabs-TitaniumCloud-v2-Figure-11.webp?width=1400&amp;amp;name=Blog-Reversinglabs-TitaniumCloud-v2-Figure-11.webp" alt="ReversingLabs" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p&gt;&lt;br&gt;The rest of this example playbook continues along the same path as the previous example by setting the severity to High if any indicators are malicious, but you can use your imagination to add additional steps that are relevant to your environment and workflows. Consider taking actions to block the discovered indicators, send the indicators to your TIP, or even quarantine endpoints if samples are found.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Conclusion&lt;/h2&gt; 
&lt;p&gt;We hope that SOC teams will find these new network reputation features useful in detecting threats in their environment. If you are an existing TitaniumCloud and Splunk SOAR customer and would like to use the example playbooks demonstrated in this post, &lt;a href="https://github.com/reversinglabs/reversinglabs-soar-conent/tree/main/SplunkSOAR/playbooks"&gt;see the playbooks in our Github repository&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Interested in learning more? See &lt;a href="https://register.reversinglabs.com/demo"&gt;the demo&lt;/a&gt; for how you can get access to TitaniumCloud for increased SOC efficiency.&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Special shoutout to our senior integration engineer Dinko Jakovljevic for making this release happen!&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Freversinglabs-titaniumcloud-v2-v1.2.0-app-for-splunk-soar&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products &amp; Technology</category>
      <pubDate>Mon, 06 Nov 2023 12:30:00 GMT</pubDate>
      <author>contact@reversinglabs.com (ReversingLabs)</author>
      <guid>https://www.reversinglabs.com/blog/reversinglabs-titaniumcloud-v2-v1.2.0-app-for-splunk-soar</guid>
      <dc:date>2023-11-06T12:30:00Z</dc:date>
    </item>
    <item>
      <title>The Power of Complex Binary Analysis</title>
      <link>https://www.reversinglabs.com/blog/the-power-of-complex-binary-analysis</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/the-power-of-complex-binary-analysis" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Blog-The-Power-of-Complex-Binary-Analysis.webp" alt="The Power of Complex Binary Analysis" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;A prism is a fascinating thing. It separates a single stream of light into different wavelengths to make visible different colors. It is a fitting metaphor for ReversingLabs complex binary analysis. It takes in a single entity, a file or software package, and through our own analysis and “refraction,” we can separate out critical insights, making it possible to see malware, tampering, vulnerabilities, exposed secrets, malicious behavior, and more. This is the power of complex binary analysis.&lt;br&gt;&lt;br&gt;ReversingLabs delivers the industry’s leading complex binary analysis technology, powered by ReversingLabs TitaniumCore. It delivers critical visibility into files, malware, and software necessary to stand up to the most advanced cybersecurity attacks. Capable of digging deeper and providing the unfettered insights necessary for any analyzed file, ReversingLabs delivers the fastest and most comprehensive solutions for automated static analysis of binary files. Proven in the field for over 15 years, the world’s leading cybersecurity enterprises and Fortune 500 partners trust ReversingLabs data analysis to enable their security teams, power their security solutions, and enhance their visibility into the modern threat.&lt;br&gt;&lt;br&gt;In the evolving cybersecurity landscape, detecting and mitigating threats has become increasingly complex, especially with the rise of sophisticated attacks through software supply chains and advanced obfuscation techniques. Traditional cybersecurity tools often rely on dynamic analysis, executing software in a controlled environment to observe its behavior. While effective in specific scenarios, dynamic analysis is resource intensive, and can be easily evaded using malicious techniques such as time-based payload execution delay methods used within the SolarWinds software supply chain attack.&lt;br&gt;&lt;br&gt;Traditional tools, including traditional endpoint security and dynamic analysis systems, cannot scale in the face of stealthy, zero-day exploits that can bypass execution-based detection mechanisms. They are often constrained by the need for known signatures or identifiable malicious behaviors without fully parsing or comprehending the file structures, making them less effective against novel or sophisticated attacks embedded in software components.&lt;br&gt;&lt;br&gt;The need to adopt a robust approach to analyze complex files and detect the most advanced cybersecurity threat in a post compilation, pre-deployment state is clear.&lt;br&gt;&lt;br&gt;ReversingLabs TitaniumCore delivers the granular and accurate technology critical to scale to these complex threats. It is the heart of a highly scalable and automated complex binary analysis technology, adept at recursively unpacking and extracting threat and risk indicators and classifying files to enhance real-time and high-volume applications. By deconstructing binaries at scale and identifying malicious components before they make it to production, it provides a crucial layer of defense that bolsters the security of software supply chains and addresses a critical blind spot in cybersecurity defenses.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-The-Power-of-Complex-Binary-Analysis.webp?width=700&amp;amp;height=366&amp;amp;name=Blog-The-Power-of-Complex-Binary-Analysis.webp" width="700" height="366" alt="Blog-The-Power-of-Complex-Binary-Analysis" style="height: auto; max-width: 100%; width: 700px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;A prism is a fascinating thing. It separates a single stream of light into different wavelengths to make visible different colors. It is a fitting metaphor for ReversingLabs complex binary analysis. It takes in a single entity, a file or software package, and through our own analysis and “refraction,” we can separate out critical insights, making it possible to see malware, tampering, vulnerabilities, exposed secrets, malicious behavior, and more. This is the power of complex binary analysis.&lt;br&gt;&lt;br&gt;ReversingLabs delivers the industry’s leading complex binary analysis technology, powered by ReversingLabs TitaniumCore. It delivers critical visibility into files, malware, and software necessary to stand up to the most advanced cybersecurity attacks. Capable of digging deeper and providing the unfettered insights necessary for any analyzed file, ReversingLabs delivers the fastest and most comprehensive solutions for automated static analysis of binary files. Proven in the field for over 15 years, the world’s leading cybersecurity enterprises and Fortune 500 partners trust ReversingLabs data analysis to enable their security teams, power their security solutions, and enhance their visibility into the modern threat.&lt;br&gt;&lt;br&gt;In the evolving cybersecurity landscape, detecting and mitigating threats has become increasingly complex, especially with the rise of sophisticated attacks through software supply chains and advanced obfuscation techniques. Traditional cybersecurity tools often rely on dynamic analysis, executing software in a controlled environment to observe its behavior. While effective in specific scenarios, dynamic analysis is resource intensive, and can be easily evaded using malicious techniques such as time-based payload execution delay methods used within the SolarWinds software supply chain attack.&lt;br&gt;&lt;br&gt;Traditional tools, including traditional endpoint security and dynamic analysis systems, cannot scale in the face of stealthy, zero-day exploits that can bypass execution-based detection mechanisms. They are often constrained by the need for known signatures or identifiable malicious behaviors without fully parsing or comprehending the file structures, making them less effective against novel or sophisticated attacks embedded in software components.&lt;br&gt;&lt;br&gt;The need to adopt a robust approach to analyze complex files and detect the most advanced cybersecurity threat in a post compilation, pre-deployment state is clear.&lt;br&gt;&lt;br&gt;ReversingLabs TitaniumCore delivers the granular and accurate technology critical to scale to these complex threats. It is the heart of a highly scalable and automated complex binary analysis technology, adept at recursively unpacking and extracting threat and risk indicators and classifying files to enhance real-time and high-volume applications. By deconstructing binaries at scale and identifying malicious components before they make it to production, it provides a crucial layer of defense that bolsters the security of software supply chains and addresses a critical blind spot in cybersecurity defenses.&lt;/p&gt;  
&lt;p style="font-weight: bold;"&gt;[ Learn how to &lt;a href="https://www.reversinglabs.com/the-monsters-in-your-software-supply-chain"&gt;address the monsters in your software supply chain&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Analysis Without Detonation or Source Code&lt;/h2&gt; 
&lt;p&gt;ReversingLabs static binary analysis can dissect and scrutinize the binary code without execution and even the need for source code in the case of software analysis. This need becomes more acute considering the surge in open-source software adoption, where binaries often come from disparate and unverified sources, mixed with commercial and proprietary code components in final builds.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;High-Speed Analysis of Complex Files&lt;/h2&gt; 
&lt;p&gt;The power of RL’s complex binary analysis is not just in the depth of its analysis but also in its unmatched processing speed, providing a solution for operations of any scale - from a few files to millions of samples daily. File and software size is no limiting factor, with the ability to deconstruct and analyze files up to 100GB with speed and accuracy. Analysis of a 30GB file can take as little as two hours. This scalability and efficiency make complex binary analysis a formidable solution to the challenges posed by the sheer volume of complex files and software components that must be analyzed and deconstructed in today's extensive attack surface - and keep development teams moving at speed.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Deep File Analysis&lt;/h2&gt; 
&lt;p&gt;Our complex binary analysis digs deep into the internal contents of files, recursively unpacking and deobfuscating them to reveal the risks and threats inside. The analysis engine performs high-speed, static analysis to unpack files, extract internal indicators, determine threat levels, and expose vital information for remediation. This high-speed and accurate analysis ensures that hidden threats are accurately identified, delivering an essential layer of security in protecting against complex cyber threats.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Complex Binary Analysis vs. Software Attacks&lt;/h2&gt; 
&lt;p&gt;While specialized tools like SCA help prevent specific issues from making it to the build, they are not designed to address the modern software supply chain attacks and can miss threats introduced later in the pipeline. These classic tools all work together, but software producers need the ability to validate trust and security of their products in the final state that they will be delivered to their customers. ReversingLabs provides that final build exam.&lt;br&gt;&lt;br&gt;ReversingLabs TitaniumCore can unpack over 400 types of packages and analyze well over 4,800 unique file types. From there, the solution can recursively unpack an application’s components down to the binary elements and scan everything for malicious code, exposed secrets, tampering, suspicious behaviors, and more.&lt;br&gt;&lt;br&gt;As the enterprise attack surface evolves, the tools we use to defend must also advance. ReversingLabs’ technology transforms the way security professionals approach the deconstruction of complex files, from the software supply chain to malware analysis and threat hunting. Unmatched in size, capability, and accuracy, TitaniumCore is the crucial technology addressing a critical blind spot in cybersecurity defenses and powers the full ReversingLabs suite of solutions.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Learn More About ReversingLabs&lt;/h2&gt; 
&lt;p&gt;&lt;a href="https://www.reversinglabs.com/products/software-supply-chain-security"&gt;ReversingLabs Software Supply Chain Security solution&lt;/a&gt; gives developers and application security teams revolutionary new capabilities that legacy secure SDLC solutions cannot provide. Its revolutionary capabilities provide broader visibility into software supply chain risks while automatically suppressing false positive results that are not actionable by developers. ReversingLabs can reveal &lt;a href="https://www.reversinglabs.com/the-monsters-in-your-software-supply-chain"&gt;when software is a malware monster&lt;/a&gt;, protecting the developer and its customers from a modern software supply chain attack.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fthe-power-of-complex-binary-analysis&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Product &amp; Technology</category>
      <pubDate>Fri, 03 Nov 2023 13:14:00 GMT</pubDate>
      <author>contact@reversinglabs.com (ReversingLabs)</author>
      <guid>https://www.reversinglabs.com/blog/the-power-of-complex-binary-analysis</guid>
      <dc:date>2023-11-03T13:14:00Z</dc:date>
    </item>
    <item>
      <title>5 best practices for putting SBOMs to work with CI/CD</title>
      <link>https://www.reversinglabs.com/blog/5-best-practices-sboms-cicd</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/5-best-practices-sboms-cicd" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/sbom-ci-cd-best-practices.jpg" alt="5 best practices for putting SBOMs to work with CI/CD" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;span style="color: #212529;"&gt;&lt;br&gt;Software bills of materials (SBOMs) have become a central component of enterprise efforts to secure the software supply chain. &lt;/span&gt;&lt;span style="color: #212529;"&gt;President Biden's 2021 Executive Order on Improving the Nation's Cybersecurity, &lt;span style="color: black;"&gt;&lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;EO 14028&lt;/a&gt;&lt;/span&gt;, made it a requirement for federal agencies to implement SBOMs when developing software internally or procuring it from external contractors. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;span style="color: #212529;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/sbom-ci-cd-best-practices.jpg?width=1400&amp;amp;height=732&amp;amp;name=sbom-ci-cd-best-practices.jpg" width="1400" height="732" alt="sbom-ci-cd-best-practices" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;Software bills of materials (SBOMs) have become a central component of enterprise efforts to secure the software supply chain. &lt;/span&gt;&lt;span style="color: #212529;"&gt;President Biden's 2021 Executive Order on Improving the Nation's Cybersecurity, &lt;span style="color: black;"&gt;&lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;EO 14028&lt;/a&gt;&lt;/span&gt;, made it a requirement for federal agencies to implement SBOMs when developing software internally or procuring it from external contractors. &lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span style="color: #212529;"&gt;Concerns about the transparency and traceability of software supply chains have been driving broad interest in SBOMs in the private sector as well. &lt;/span&gt;&lt;span style="color: #212529;"&gt;A survey that Sonatype conducted earlier this year showed that &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://www.sonatype.com/resources/white-paper-2023-sbom-survey-report"&gt;76% of enterprise organizations&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212529;"&gt; in the United States and the United Kingdom maintain SBOMs and that 60% require their software vendors and others they work with to do the same for their software. Other factors driving adoption include broader cybersecurity posture — improvement plans and concerns over software supply chain attacks, the study found.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212529;"&gt;&lt;a href="https://www.reversinglabs.com/blog/white-house-memo-lays-down-the-law-on-software-supply-chain-security"&gt;EO 14028 and related documents&lt;/a&gt; focus on requirements to use SBOMs and on the content that SBOMs must include. But making SBOMs useful is tricky in modern development organizations. Here are five best practices for implementing SBOMs in continuous integration/continuous deployment (CI/CD) environments.&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span style="color: #212529;"&gt;[&lt;a href="https://www.reversinglabs.com/solutions/software-bill-of-materials-sbom"&gt; Learn more about SBOMs&lt;/a&gt; | &lt;a href="https://register.reversinglabs.com/free_softwarebillofmaterials"&gt;Get a free RL SBOM and supply chain risk analysis&lt;/a&gt; ]&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #212529;"&gt;1. Automate SBOM generation &lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #212529;"&gt;The key to operationalizing SBOMs in your CI/CD pipeline is ensuring that &lt;a href="https://www.reversinglabs.com/blog/software-supply-chain-risk-and-sbom-automation-the-next-step-in-modern-security-practices"&gt;they are automatically created with each software build&lt;/a&gt;. Multiple tools for generating SBOMs are available that integrate directly into CI/CD tooling. Examples include &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://owasp.org/www-project-dependency-check/#:~:text=Dependency%2DCheck%20is%20a%20Software,identifier%20for%20a%20given%20dependency."&gt;OWASP Dependency-Check&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212529;"&gt;, &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://cyclonedx.org/guides/sbom/generation/#:~:text=Integrating%20CycloneDX%20Into%20The%20Build,SBOMs%20for%20cybersecurity%20use%20cases."&gt;CycloneDX&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212529;"&gt;, &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;/span&gt;&lt;span style="color: #212529;"&gt;and &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://fossa.com/solutions/sbom-managment"&gt;FOSSA&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212529;"&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #212529;"&gt;Choose a tool that is scalable, supports multiple languages, and works with widely accepted data formats. And ensure that the &lt;/span&gt;&lt;span style="color: #222222; background-color: white;"&gt;build-time SBOM tools you choose provide a holistic view of what's in the application and cover what customers want enumerated in their SBOMs, said Tom Goings, product consultant&lt;span&gt;&amp;nbsp;&lt;/span&gt;at Tanium.&lt;/span&gt;&lt;span style="color: #222222; background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #222222; background-color: white;"&gt;Not all tools do the same thing. OWASP's Dependency-Check, for instance, is a &lt;a href="https://app.hubspot.com/blog/3375217/editor/122955340144/content"&gt;software composition analysis (SCA)&lt;/a&gt; tool that analyzes &lt;span style="color: #222222; background-color: white;"&gt;&lt;span style="color: #222222; background-color: white;"&gt;primarily &lt;/span&gt;&lt;/span&gt;open-source components within a project, identifying dependencies and checking for known vulnerabilities. CycloneDX does the same thing, but for both open-source components and custom or internally developed code.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #222222; background-color: white;"&gt;The SBOM that you provide to customers should provide a comprehensive view of all the off-the-shelf, open-source, and internally developed components, Goings said. &lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"Build-time SBOMs allow software vendors to provide customers with a complete list of what is in their software when they ship. They are focused on providing details to customers about what is in the application they purchased."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/tomgoings/" style="font-style: italic;"&gt;Tom Goings&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #212529;"&gt;2. Ensure your SBOM has the required elements&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;An SBOM should list all components, including direct and transitive dependencies, libraries, frameworks, and any custom code, open-source code, and/or third-party modules in an application. The&lt;/span&gt;&lt;span style="color: #212529;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://www.ntia.gov/files/ntia/publications/howto_guide_for_sbom_generation_v1.pdf"&gt;list of baseline elements&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #212529;"&gt; that the National Telecommunications and Information Administration's (NTIA) developed in response to EO 14028&lt;/span&gt;&lt;span style="color: #212529;"&gt; identifies these elements: the name of the component, the component type, the author, the supplier's name, the version string, the unique identifier, and component hash and dependency information.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;Get as granular as you need when it comes to including information in an SBOM, advised Michael Mehlberg, CEO of Dark Sky Technology. "Provide a list of all components, source location, version information, and authorship information so that dependencies can be tracked for all dependencies in the entire dependency tree," he said. Storage is cheap and processing power is easily available when it comes to storing and processing SBOMs. So there's no need to shortchange or second guess what to include in an SBOM, he said.&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;span style="font-style: italic;"&gt;"Generate an SBOM with the most information available, store it with your release, then operationalize it to track things like software license rights, security vulnerabilities, etc."&lt;/span&gt;&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;&lt;a href="https://www.linkedin.com/in/mmehlberg/" style="font-style: italic;"&gt;Michael Mehlberg&lt;/a&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;Including data on when during the software lifecycle the SBOM data was collected can also be useful. The NTIA recommends — but does not require — that federal agencies include data on whether, for instance, component data was collected from the software source, or at build time, or via a binary analysis tool. SBOMs can have differences based on when the data was collected, so documenting when, where, and how the data was collected can be useful, the NTIA has noted.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: #212529;"&gt;3. Export SBOMs in a standard data format &lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #212529;"&gt;Using a standard data format for your SBOM is critical to interoperability so that different tools can process it.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;The &lt;/span&gt;&lt;span style="color: black;"&gt;&lt;a href="https://www.ntia.gov/files/ntia/publications/sbom_minimum_elements_report.pdf"&gt;&lt;span style="background-color: white;"&gt;NTIA's Minimum Elements for a Software Bill of Materials&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: black; background-color: white;"&gt; document requires federal agencies to generate and consume SBOMs in one of three formats: CycloneDX, Software Package Data eXchange (SPDX), or Software Identification (SWID) tags. Though all three formats can be used to represent SBOM information, each has a slightly different focus and use case. The primary use case for CycloneDX, for instance, is cyber-risk mitigation. With SPDX, the main focus is communicating information on the components, licenses, and copyrights associated with a software package. And SWID is a standard for uniquely identifying software applications and components.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;Be sure the format is both human- and machine-readable and can be consumed by the software consumer, Dark Sky's Mehlberg said. "Make sure the format captures the information you are required to capture and deliver to your consumers," he advised. "CycloneDX, SPDX, and SWID are all great SBOM formats but have their own set of data they track, which may or may not be applicable to your software requirements."&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: black; background-color: white;"&gt;4. Ensure your SBOMs' integrity and authenticity&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;It's important that a software consumer is able to verify the authenticity and integrity of an SBOM and to ensure that the &lt;span style="color: black; background-color: white;"&gt;SBOM&lt;/span&gt; has not been tampered with during transit or storage. The NTIA recommends that software developers consider using existing mechanisms for integrity and authenticity — such as digital signatures and cryptographic hashes — for providing that assurance. "Those supplying and requesting SBOMs are encouraged to explore options to both sign SBOMs and verify tamper-detection," the NTIA has noted in its guidance on the topic. "Such a mechanism should allow the signing of each component of a given piece of software and allow the user to determine whether the signature is legitimate."&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;CycloneDX and SPDX both support the inclusion of such information in an SBOM.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;&lt;span style="color: black; background-color: white;"&gt;5. Keep your SBOMs updated&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;Component information can change, and new vulnerabilities can emerge in third-party, open-source, and custom-built software. Keeping an SBOM updated is critical to ensure continuous security and compliance with licensing and regulatory requirements. It's not just a nice-to-follow practice, but a required one for U.S. federal agencies. The NTIA requires a new SBOM every time a software component is updated. The requirement applies to every new build or release of software or when a component or dependency in a software build gets updated,&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #222222;"&gt;Anthony Tam, manager of security engineering at container security vendor Tigera, which also is the primary maintainer of Calico open-source software, said using an SCA tool to scan your software and its dependencies is a good measure for unearthing vulnerabilities and license issues that might have crept into your software since the last build. &lt;/span&gt;&lt;span style="color: #222222;"&gt;"It is important to continually monitor open-source components for new vulnerabilities, as they are constantly evolving," &lt;span style="color: #222222; background-color: transparent;"&gt;Tam said. "&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #222222; background-color: transparent;"&gt;When vulnerabilities have been identified, it is important to prioritize them based on severity and potential impact."&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Prioritization can be done by using a risk-based approach, considering factors such as the likelihood and potential impact of a vulnerability being exploited."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Anthony Tam&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;&lt;span style="color: black; background-color: white;"&gt;Making SBOMs operational is key&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: black; background-color: white;"&gt;While SBOMs are crucial to securing the software supply chain, they are of little value if an organization doesn't know how to operationalize them fully. &lt;span style="color: black; background-color: white;"&gt;Mehlberg said an SBOM tells you what your software is made up of, but it says nothing about what is in it, the trustworthiness of the developers who developed it, the vulnerabilities associated with it, the quality of the code in the packages, or the licenses that could affect you legally. He recommends this routine:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Get an SBOM. Check it. Track it. Then analyze it for security, trust, and legal risks."&lt;br&gt;&lt;span style="font-style: italic;"&gt;—&lt;/span&gt;Michael Mehlberg&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Matt Rose, Field CISO at ReversingLabs, said that for SBOMs to be effective, organizations need to adopt the same integration and automation into DevOps for SBOMs as they do with all their other application security testing tooling.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;&lt;span&gt;&lt;/span&gt;&lt;i&gt;"Without automation and standardization, SBOMs will be out of date and ineffective."&lt;/i&gt;&lt;br&gt;&lt;i&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/i&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2F5-best-practices-sboms-cicd&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Software Bill of Materials (SBOM)</category>
      <pubDate>Wed, 01 Nov 2023 11:30:00 GMT</pubDate>
      <author>jaikumar.vijayan@gmail.com (Jaikumar Vijayan)</author>
      <guid>https://www.reversinglabs.com/blog/5-best-practices-sboms-cicd</guid>
      <dc:date>2023-11-01T11:30:00Z</dc:date>
    </item>
    <item>
      <title>IAmReboot: Malicious NuGet packages exploit loophole in MSBuild integrations</title>
      <link>https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages.webp" alt="IAmReboot: Malicious NuGet packages exploit loophole in MSBuild integrations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;ReversingLabs has identified connections between a malicious campaign that was recently discovered and reported by the firm Phylum and several hundred malicious packages published to the NuGet package manager since the beginning of August. The latest discoveries are evidence of what seems to be an ongoing and coordinated campaign.&lt;/p&gt; 
&lt;p&gt;Furthermore, ReversingLabs research shows how malicious actors are continuously improving their techniques and responding to the disruption of their campaigns. Specifically, threat actors have moved from simple downloaders executing inside install scripts to a more refined approach that exploits NuGet’s MSBuild integrations feature.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages.webp?width=1400&amp;amp;height=732&amp;amp;name=Blog-Malicious-NuGet-Packages.webp" width="1400" height="732" alt="Malicious-NuGet-Packages" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;ReversingLabs has identified connections between a malicious campaign that was recently discovered and reported by the firm Phylum and several hundred malicious packages published to the NuGet package manager since the beginning of August. The latest discoveries are evidence of what seems to be an ongoing and coordinated campaign.&lt;/p&gt; 
&lt;p&gt;Furthermore, ReversingLabs research shows how malicious actors are continuously improving their techniques and responding to the disruption of their campaigns. Specifically, threat actors have moved from simple downloaders executing inside install scripts to a more refined approach that exploits NuGet’s MSBuild integrations feature.&lt;/p&gt;  
&lt;h2 style="font-weight: bold;"&gt;An IAmRoot reboot? Revisiting a hidden code execution technique&lt;/h2&gt; 
&lt;p&gt;On October 15, three packages exploiting a previously unseen execution technique were published to the NuGet repository: &lt;em&gt;ZendeskApi.Client.V2, Betalgo.Open.AI,&lt;/em&gt; and &lt;em&gt;Forge.Open.AI&lt;/em&gt;. These are typosquatting on popular Nuget packages named &lt;em&gt;ZendeskApi.Client, Betalgo.OpenAI and Forge.OpenAI&lt;/em&gt;.&amp;nbsp;&lt;br&gt;&lt;br&gt;Typosquatting attacks are common, as we have reported. But these packages employed an unusual code execution technique that is worth mentioning. Most of the malware published to the NuGet repository places malicious code inside the initialization and post installation PowerShell scripts. These packages use a different approach, with the malicious functionality placed inside the &lt;em&gt;&amp;lt;packageID&amp;gt;.&lt;/em&gt;targets file in the &lt;em&gt;“build”&lt;/em&gt; directory.&amp;nbsp;&lt;br&gt;&lt;br&gt;The first NuGet package we detected using this technique for malicious purposes was version 6.5.3 of &lt;em&gt;Pathoschild.Stardew.Mod.Build.Config &lt;/em&gt;package. Versions 6.5.1 and 6.5.2 of this package contained malicious functionality in initialization PowerShell scripts, but version 6.5.3 didn’t include them. Instead, the malicious functionality was placed inside the &lt;em&gt;&amp;lt;packageID&amp;gt;.targets&lt;/em&gt; file in the &lt;em&gt;“build”&lt;/em&gt; directory.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-1.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-1.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-1.webp" alt="Malicious content" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 1: Malicious content inside the Pathoschild.Stardew.Mod.Build.Config.targets file&lt;/span&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The code encapsulated inside the &lt;span style="font-style: italic;"&gt;&amp;lt;Code&amp;gt;&lt;/span&gt; property of this XML file is almost identical to the functionality present in the PowerShell scripts from the earlier two versions of the package. When run, it downloads an executable from a remote location and executes it in a new process. Since we haven’t previously seen malware with the malicious functionality observed in the &lt;em&gt;.targets&lt;/em&gt; files, we did a bit of research, which led to some interesting discoveries.&amp;nbsp;&lt;br&gt;&lt;br&gt;First, the string artifact in the first line of the file, “IAmRootDemo” led us to the root of this execution technique. Several years ago, in 2019, the &lt;a href="https://www.nuget.org/packages/IAmRoot#readme-body-tab"&gt;IAmRoot &lt;/a&gt;package was published by &lt;a href="https://github.com/augustoproiete"&gt;C. Augusto Proiete&lt;/a&gt;. The purpose of the package: “To demonstrate that any NuGet package can run arbitrary code on your machine.”&lt;br&gt;&lt;br&gt;IAmRoot uses MSBuild integrations, which were added in &lt;a href="https://learn.microsoft.com/en-us/nuget/release-notes/nuget-2.5#automatic-import-of-msbuild-targets-and-props-files"&gt;NuGet v2.5&lt;/a&gt; to improve the &lt;a href="https://devblogs.microsoft.com/nuget/native-support/"&gt;support for native projects&lt;/a&gt;, to achieve execution. How does it function? As described in the &lt;a href="https://learn.microsoft.com/en-us/nuget/release-notes/nuget-2.5#automatic-import-of-msbuild-targets-and-props-files"&gt;NuGet release notes&lt;/a&gt;: “When NuGet installs a package with &lt;span style="font-style: italic;"&gt;\build&lt;/span&gt; files, it will add an MSBuild &amp;lt;Import&amp;gt; element in the project file pointing to the .targets and .props files.”&amp;nbsp;&lt;br&gt;&lt;br&gt;The sneaky part is that MSBuild files can include &lt;a href="https://learn.microsoft.com/en-us/visualstudio/msbuild/msbuild-inline-tasks?view=vs-2022#code-element"&gt;inline tasks&lt;/a&gt;, which can contain executable code. Imagine you are developing package A and you want your package to use package B. Package B contains a &lt;span style="font-style: italic;"&gt;.targets&lt;/span&gt; file with an inline task containing executable code. When you add package B to your package A, the content of &lt;span style="font-style: italic;"&gt;.targets&lt;/span&gt; file from package B gets imported into the project file of package A. From that moment on, every time package A is built, inline tasks from the imported .&lt;span style="font-style: italic;"&gt;targets&lt;/span&gt; file will get executed. There has been an ongoing &lt;a href="https://github.com/NuGet/Home/issues/10262"&gt;discussion about the security implications of such mechanisms in NuGet’s GitHub repository&lt;/a&gt;, but the issue hasn’t been resolved.&lt;/p&gt; 
&lt;p&gt;We’re now dealing with the consequences of that. Based on our research, this is the first known example of malware published to the NuGet repository exploiting this inline tasks feature to execute malware.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;Based on our research, this is the first known example of malware published to the NuGet repository exploiting this inline tasks feature to execute malware.&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-2.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-2.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-2.webp" alt="Utilizing MSBuild integrations" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 2: Utilizing MSBuild integrations to execute malicious code in NuGet packages&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;&lt;br&gt;All in the (malware) family&lt;/h2&gt; 
&lt;p&gt;The three previously mentioned packages — &lt;em&gt;ZendeskApi.Client.V2, Betalgo.Open.AI, Forge.Open.AI&lt;/em&gt; — are &amp;nbsp;clearly part of the same ongoing campaign, started in August, and are very similar to the &lt;em&gt;Pathoschild.Stardew.Mod.Build.Config &lt;/em&gt;package. They contain almost identical functionality in the &lt;em&gt;.targets&lt;/em&gt; file (Figure 1), except that the obfuscated stage 2 payload is in the latest case downloaded from a GitHub repository and not from an attacker controlled IP address.&amp;nbsp;&lt;br&gt;&lt;br&gt;The malware authors also tried to make the malicious code harder to spot by using spaces and tabs to move it outside of the content visible within the default screen width. (ReversingLabs researcher Lucija Valentić observed a similar technique used in&lt;a href="https://www.reversinglabs.com/blog/beware-impostor-http-libraries-lurk-on-pypi"&gt; campaign on the Python Package Index (PyPI) in February&lt;/a&gt;.) They also inflated the download count numbers to make the package look more trustworthy, as evidenced by the vast majority of package downloads being attributed to an “unknown” client, versus some version of the NuGet client.&lt;/p&gt; 
&lt;p&gt;The malicious NuGet packages were detected by ReversingLabs within less than 24 hours of being published and were reported to the NuGet security team and removed shortly after preventing a more severe impact of the campaign. This discovery has been linked to a previous campaign which utilized &lt;span style="font-style: italic;"&gt;init.ps1&lt;/span&gt; scripts to achieve code execution.&amp;nbsp;&lt;br&gt;&lt;br&gt;One week later on Sunday, October 22, we observed malicious actors preparing to publish another set of malicious NuGet packages. Threat actors created several packages and published two versions that contained benign code in the &lt;span style="font-style: italic;"&gt;.targets &lt;/span&gt;file that writes a simple message to the console.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-3.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-3.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-3.webp" alt="Version stats for one of the malicious packages" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 3: Version stats for one of the malicious packages&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The next day, downloads for the package were pumped up to make package statistics look more trustworthy. Then, on October 24, the malicious versions of the packages were finally published. They contained the same downloader functionality, fetching the stage 2 malware payload from the newly created, throwaway GitHub repository. This time, the Stage 2 malware was a .NET executable which executes an obfuscated command line embedded as a resource.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-4.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-4.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-4.webp" alt="Newly created, throwaway GitHub account" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 4: Newly created, throwaway GitHub account&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The packages published in this group imitated popular packages published by the following NuGet publishers: &lt;a href="https://www.nuget.org/profiles/CDataSoftware"&gt;CDataSoftware&lt;/a&gt;, &lt;a href="https://www.nuget.org/profiles/ServiceTitan"&gt;ServiceTitan&lt;/a&gt;, &lt;a href="https://www.nuget.org/profiles/cloudextend-oss"&gt;cloudextend-oss&lt;/a&gt; and &lt;a href="https://www.nuget.org/profiles/syntellect"&gt;syntellect&lt;/a&gt;. These typosquatting attacks were very convincing, using the same icons for packages and package names that differed by only a single dot. Such decoy packages would be difficult for a developer to identify without close inspection of the packages to spot these subtle differences (Figure 5). &amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-5.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-5.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-5.webp" alt="Search results displaying an legitimate (top) and malicious, typo-squatted package" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 5: Search results displaying an legitimate (top) and malicious, typo-squatted package &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;This is more proof that the threat actor behind this campaign is being careful and paying attention to details, and is determined to keep this malicious campaign alive and active.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Round up the usual code execution techniques!&lt;/h2&gt; 
&lt;p&gt;As noted, the latest packages have strong links to a campaign described in a recent &lt;a href="https://blog.phylum.io/phylum-discovers-seroxen-rat-in-typosquatted-nuget-package/"&gt;research blog post &lt;/a&gt;published by Phylum on October 6. That research described a typosquatting campaign delivering SeroXen RAT. In that campaign, the malware used a well-known execution technique that was also observed in a campaign distributing the Impala Stealer and &lt;a href="https://jfrog.com/blog/attackers-are-starting-to-target-net-developers-with-malicious-code-nuget-packages/"&gt;reported by JFrog&lt;/a&gt; in March, 2023.&lt;/p&gt; 
&lt;p&gt;In both cases downloader functionality was placed into PowerShell scripts located inside the &lt;span style="font-style: italic;"&gt;“tools”&lt;/span&gt; directory of the NuGet package. This included &lt;span style="font-style: italic;"&gt;init.ps1, install.ps1&lt;/span&gt; and &lt;span style="font-style: italic;"&gt;uninstall.ps1&lt;/span&gt; scripts, which are run on certain events including installation and uninstallation of a package, depending on the version of the Visual Studio. These scripts are deprecated by newer versions of the NuGet format, but Visual Studio still executes the content inside the &lt;span style="font-style: italic;"&gt;init.ps1&lt;/span&gt; script upon installation of a NuGet package, regardless of whether it is specified in the &lt;span style="font-style: italic;"&gt;.nuspec&lt;/span&gt; file.&amp;nbsp;&lt;br&gt;&lt;br&gt;This autorun mechanism is quite a popular technique for code execution in NuGet packages and the packages Phylum reported are a part of a broader, previously unreported campaign started in August 2023. This campaign was quite noisy, and included more than 700 packages which were quickly detected and removed from the NuGet repository. They very likely didn’t have a big impact. The packages detected by Phylum weren’t very sophisticated and contained only the basic files required to satisfy NuGet requirements. Even the name of the &lt;span style="font-style: italic;"&gt;.nuspec&lt;/span&gt; file didn’t conform with NuGet package ID naming convention, making it easier to spot.&amp;nbsp;&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-6.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-6.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-6.webp" alt="Content of the malicious Nughettt.TestPO package" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 6: Content of the malicious Nughettt.TestPO package published in August&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;The malicious functionality was fairly simple. It was located in the &lt;em&gt;tools/init.ps1&lt;/em&gt; script and downloaded a stage 2 payload from a remote location and executed it afterwards.&lt;/p&gt; 
&lt;a href="https://blog.reversinglabs.com/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-7.webp" class="lightbox-image"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/Blog/Blog-Malicious-NuGet-Packages-Figure-7.webp?width=1400&amp;amp;name=Blog-Malicious-NuGet-Packages-Figure-7.webp" alt="Content of the init.ps1 script" width="1400" style="width: 1400px;"&gt;&lt;/a&gt; 
&lt;p style="text-align: center;"&gt;&lt;br&gt;&lt;span style="font-weight: bold; font-size: 16px;"&gt;Figure 7: Content of the init.ps1 script from one of the detected packages&lt;/span&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;The first package published as a part of that campaign was &lt;em&gt;Nughettt.TestPO&lt;/em&gt;, published on August 1st. There were several connections between the 700 packages published in August and the packages from Phylum’s report. The first one is the comment “&lt;em&gt;# IGBOAT Crew&lt;/em&gt;” detected in the code from both groups of packages. More proof of this was found in the &lt;em&gt;fafagewg.nuspec&lt;/em&gt; file, which is located in the &lt;em&gt;Nughettt.TestPO&lt;/em&gt; package and also in some of the packages published by the author &lt;em&gt;Disti&lt;/em&gt;, mentioned in Phylum’s report.&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;Additionally, a package named &lt;em&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/em&gt;, almost identically named as the &lt;em&gt;Pathoschild.Stardew.Mod.Build.Config&lt;/em&gt; (different in only one ‘.’) package from Phylum’s report, contained the same payload as the initial &lt;em&gt;Nughettt.TestPO&lt;/em&gt;&lt;span style="font-weight: bold;"&gt; &lt;/span&gt;package, further proving that all of these packages are part of the same campaign.&amp;nbsp;&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Discussion&lt;/h2&gt; 
&lt;p&gt;Previous research reports from ReversingLabs have warned about security threats in the &lt;a href="https://www.reversinglabs.com/blog/r77-rootkit-typosquatting-npm-threat-research"&gt;npm&lt;/a&gt;, &lt;a href="https://www.reversinglabs.com/blog/vmconnect-supply-chain-campaign-continues"&gt;PyPI &lt;/a&gt;and &lt;a href="https://www.reversinglabs.com/blog/mining-for-malicious-ruby-gems"&gt;RubyGEMS &lt;/a&gt;ecosystems. This newest finding adds the NuGet package repository to that list, and proves that NuGet is equally exposed to malicious activities conducted by threat actors.&lt;br&gt;&lt;br&gt;Specifically, this research report describes an ongoing campaign which has been targeting the NuGet repository since August 2023. The threat actors behind it are tenacious in their desire to plant malware into the NuGet repository, and to continuously publish new malicious packages. As soon as the previous packages are removed from the repository, ReversingLabs detected newly published packages on a daily basis.&lt;br&gt;&lt;br&gt;The new malware samples ReversingLabs detected suggest that the malicious actors responsible for this campaign are adopting a documented but uncommon technique that exploits NuGet’s MSBuild integrations feature in order to plant malicious code on their victims. As always, developers need to remain vigilant of the threats lurking in the open source ecosystem.&lt;/p&gt; 
&lt;p&gt;What's needed is deep visibility inside software packages, to distinguish malicious functions from legitimate ones. This can be challenging with &lt;a href="https://www.reversinglabs.com/blog/why-app-sec-testing-alone-is-not-enough-to-secure-your-software-supply-chain"&gt;legacy application security testing tools&lt;/a&gt;, and demands specialized skills and knowledge that many organizations lack. Modern tools like &lt;a href="https://www.reversinglabs.com/products/software-supply-chain-security"&gt;ReversingLabs Software Supply Chain Security&lt;/a&gt; can bridge the gaps, and help development and application security teams protect their supply chain from compromise.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Indicators of Compromise (IOCs)&lt;/h2&gt; 
&lt;p&gt;Indicators of Compromise (IoCs) refer to forensic artifacts or evidence related to a security breach or unauthorized activity on a computer network or system. IOCs play a crucial role in cybersecurity investigations and cyber incident response efforts, helping analysts and cybersecurity professionals identify and detect potential security incidents.&lt;br&gt;&lt;br&gt;The following IOCs were collected as part of ReversingLabs investigation of this software supply chain campaign.&amp;nbsp;&lt;/p&gt; 
&lt;h3 style="font-weight: bold;"&gt;NuGet packages:&lt;/h3&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2; height: 312px;"&gt; 
  &lt;tbody&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; background-color: #171d38; height: 26px;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;package_name&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; background-color: #171d38; height: 26px; text-align: center;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;version&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; background-color: #171d38; height: 26px;"&gt;&lt;span style="color: #ffffff;"&gt;&lt;strong&gt;SHA1&lt;/strong&gt;&lt;/span&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;Pathoschild.Stardew.Mod.Build.Config&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;6.5.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;f474da140a91aca8eb75084b8af0580a2a5f9f9c&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;Pathoschild.Stardew.Mod.Build.Config&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;6.5.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;d716dda6b465e16222287f1973454fc6daa62c66&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;Pathoschild.Stardew.Mod.Build.Config&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;6.5.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;c6f7dc7f9e2a5447f966f582d4fe41869ee07275&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;KucoinExchange.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;5.0.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;48dfbe8ceb801a556255841e1270bd1f55132572&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;KucoinExchange.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;5.0.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;a45b7b2f73864dcc50993cab9465081f6974094b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;KucoinExchange.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;5.0.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;6ee07eb39946ce546f7a96645affa12e568c47ab&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;Kraken.Exchange&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;4.1.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;f1b54fa7dc92998d82f7453f7c41e31d86288c18&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;Kraken.Exchange&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;4.1.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;2d81de5fe1c88cd5b732deb04e449d13ce60072e&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;Kraken.Exchange&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;4.1.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;d056eb9d74c250b337be8b239dfdef55ef78d56a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;DiscordsRpc&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;2.3.4.41&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;109c09147586389ba45b7761fd83ec88841e4d59&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;DiscordsRpc&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.3.4.42&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;9e59ca377199ddd839de785cf2dff73aa6670144&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr style="height: 26px;"&gt; 
    &lt;td style="width: 37.3382%; padding: 4px; height: 26px;"&gt;DiscordsRpc&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; height: 26px; text-align: center;"&gt;2.3.4.43&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px; height: 26px;"&gt;23f2faf65e8b0d024a1f9cca80c42c56c62e8184&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;DiscordsRpc&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.3.4.44&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c4b2077af263b72b9e90c815b13e505fe2026e47&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;DiscordsRpc&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.3.4.45&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;68ae280dd3c7b0caa0f5aac3128fc924cc24ab32&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;SolanaWallet&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.25.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;2a09ef73b8e6e28ffee0aa2daf9e8a1905d389f4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;SolanaWallet&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.25.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;40145b10a331be75a7d77577f4577e83e81117a6&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;SolanaWallet&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.25.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;b7dadebdd6c4b4c978a733fb1ae31857896701ad&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;SolanaWallet&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.25.4&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;a405145005cee5823de3531f4c66631d7c4e0033&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;SolanaWallet&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.25.5&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;5f7f882c59e31e7d83129d0a09579b47fd931be0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;SolanaWallet&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.25.6&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;8ab0b3b437fa3aaecd89eaa4681d56eb4990cb06&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Monero&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.3.4.41&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;679875b3bc415fb81f83919f7ecc6f226b372dde&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Monero&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.3.4.42&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1d72719509f2f2a6852bb001ad6b52a38489c09d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;xopxopxopxopxopx&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;0706311de6caa47ee4febb54e8aa7e57290281d2&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Modern.Winform.UI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;b548221b4fadcf00bde6567eea11189e0719a812&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Modern.Winform.UI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;e7d54ba61fe291d8ea862ce7a23b9c3cd8e8f988&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Modern.Winform.UI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;64d257ba67db909446007944fe8d4c145c3b4f03&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Modern.Winform.UI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.4&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;39f5dfd63237530abe5d1e8f418f739992d0d766&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Modern.Winform.UI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.5&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;708e16fee69655dd0ee0ee60220c6395779b0070&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Modern.Winform.UI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.4.0.6&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;dcfb36931677d0860e62552e35f1d67a5d77e2a1&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;MinecraftPocket.Server&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.0.2305&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;4bf3e03363d0e59051d22fdd2e498c02dfb19dd0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CodeExecTest&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c03b21f48cf80e5cd9ee89e254d6327d74f5c8fb&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRootx&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;45d715d7597cfaa043b7532efc71f69209d15a51&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRootx&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.0.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f182a3c99fc568d4ebcf22fd7d558d93bd00c7c7&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.0.1-beta&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;14af9c50437f4894a44325a6dd45f12ea52c8247&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;ae9fd408f32bddddd54329e641984ce7e2ca4310&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;2b76e606281d33cb88de47e68a9e456a7c03ab8b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;0c050ea1afbe29f1c4126b778d8ea640f15a9301&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;69738f031300662f2cfc034b3f290953918c467b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;de67e07596ccfb2257675b8d4d1d092a86d8d855&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;IAmRoot&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;2.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;fa7063ab77cc0bc40ebaef5716024174a2d8dbef&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;ZendeskApi.Client.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;5.0.6&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;62f6a2715a379468bbc38b28066e7bda2137fd98&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;ZendeskApi.Client.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;5.0.7&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d72534b14f5fedcdca0629367f9b93af92bd6bd5&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;ZendeskApi.Client.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;5.0.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;bae28ac375dc5b89d0be371f0d4421abe17bde84&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;ZendeskApi.Client.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;5.0.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;8950d150f8f7ad70accb928e792e114bfdb22719&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;ZendeskApi.Client.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;8a1d7189b2e4547ab730397fe1e95898474c1f41&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Betalgo.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;7.1.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d9e517e2dc0f54c99727a0f17df9b241a2a1aabc&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Betalgo.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;7.1.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;75361acfb735c1c46f073b7142d66cc944f37bef&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Betalgo.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;7.2.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;ec5bd0c43eef8a94b340e64cf6e649d65b9a9d90&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Forge.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d18e6074b797bcf80d0a203fc9c278eeaded44b9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Forge.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.4&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d46c0641697e18011bd084cb62110ffc394b9ae8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Forge.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.5&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;3ffe89ee4b7a3cb9184ffe84aa0279c91b5b8dca&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Forge.Open.AI&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.1.6&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c0f04c7b015cff331921b7996f66a762a430e76a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Nughettt.TestPO&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;a11ac467846b4e3e541b74d6d59ec8d5e6fcbb6f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;ff0990ce50448be5f19c89d4ac2d18714facb566&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;0f88db4448334cf5bb75542a955475f42dca004d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.3&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1044dc4fccab73c8d238b5d4505adc67b977dcb4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.4&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f1ccafe37c8b84f83d1954b9ae438d7cf0eec42a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.5&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;853254467e9667efab60ed800f0a5021232a8c83&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.6&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;a4c3569b076113b4d1258c7210cb3c5a242659cc&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.7&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c6ff26c0670806aa80d7f1d5bc7d662b263b1124&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d81a7608a97b44af04157dd9086c4e2e46c93369&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.2.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;9cfb17c19ea29dba6a4dfb4281633660c74f6cf0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.3.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;993d0f3594b217573b504d5f190670d480d386b9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Pathoschild.Stardew.Mod.BuildConfig&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f5e8e315fc6a0cd7cb452859e492ed45da6c932f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.NetSuite.Net.Framework&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8669&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;247ad37694ea0eaaf93ee9eaffda22703b0653b4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.NetSuite.Net.Framework&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8670&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1c03781c4033d160dabe18bcc38504ef21eb56a8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.NetSuite.Net.Framework&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8671&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;9490bf38a151fc0f3b99d940bb04359792862e95&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Salesforce.Net.Framework&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8669&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;fae0697f55d9244980bffdf65216f98961153953&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Salesforce.Net.Framework&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8670&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;b4e6deceabaef67d64865cbe6197397dec420a86&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Salesforce.Net.Framework&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8671&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;ff9d0e9f91e9837069c302539747fd1a1f2140c3&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Snowflake.API&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8669&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;fdc40bf0a0b372358767670e7b9e518c8208962d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Snowflake.API&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8670&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;b6a2589eade5649b6ad41237a38d1547634a4148&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Snowflake.API&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8671&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;79c52e34bdbbe00fb54f3c78817223436596b1c4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Snowflake.EntityFramework.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8669&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f30b9cb625fde948fc00724a370a4420e1426732&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Snowflake.EntityFramework.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8670&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;03d5532e39357ec0422614a7913e2a426beb0730&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;CData.Snowflake.EntityFramework.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;23.0.8671&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1ccec9016788bdacae3635eab81a322258f314a9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Chronos.Contracts.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;12dbb19aa8059f0c73a689db48bc86dcff757d3d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Chronos.Platform.Linux.API&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1d369efe94859986f549ae0ecde92750fd3e147f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Chronos.Platforms&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;7026a7f2b50bd4999927b59e58a18601891ecfc6&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;LazyProxy.Unity.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.0.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;e33ec6d268711f7b882c00c568002c27ef995bfc&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Blazor.Authentication.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;47896d0cf5c8d10bd03b57d1d1f5005b1f67cdd9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Blazor.Authentication.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;2cab3c7e4781bd5f0e35d40c4382ad0ebad3ebb4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.CommandLine.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.2.22&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c6d6e5f66f50793bee955a6abd3ece7a1e0c3eac&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.CommandLine.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.2.23&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;519767ceb3af15336f8ecfcc09d5ba9237a9ff9d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Fusion.Ext.Contracts.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;cdda2b33879b3e2d028b3099cc7e885501c8e00d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Fusion.Ext.Contracts.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;7987192d807124f8a4c5c45399dff7b77349a6cb&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Fusion.Ext.Services.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1bb64c3b078440c7bf7f3130bfa1e0f64fb56e71&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Fusion.Ext.Services.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;5702153b0b44071d916f099d75155f1867d80e4a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Generators.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;8123f5fab4cc5acfaee5f419b1efba52a69ac456&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Generators.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d959ac811872fde62386725456a937b943e236ee&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Plugins.Extensions.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.2.22&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;96aa8d35910118e51eb962c5b6a5f64e9c3f8f99&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Plugins.Extensions.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.2.23&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;0170734a8a42976aa20cbc09e999433c1aabed9b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.RestEase.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;2a22fa4277644bf07a4b92575248cf4b931e8614&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.RestEase.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f0220fdc65fe5a4be3cf67b9d2eea44c79473117&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Rpc.Server.Core&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;72fe525e541fca4b7766d05bd0d0162c32002fa1&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Rpc.Server.Core&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;95ec7567218829bc95d4b10d546186116b477ad8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Rpc.Server.Net.Fx&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.8&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;922bb97ba1bff39324f79daf305fb021bf42246c&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Stl.Rpc.Server.Net.Fx&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;6.5.9&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;3fc3056ac2736278aa11c8deaad012d9a8e9de3b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Syntellect.Winium.Cruciatus.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.1.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;34f7c52873404ca899733d95899c5b8cf1d76db6&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Syntellect.Winium.Element&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.2.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d014e8287dd2430386cadeb5fcea324dff82ce10&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Syntellect.Winium.Web.Driver&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;0.1.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;fe30654a7947c337a6718679df8ee436da7f8e0e&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Analyzer&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c19e63c685b85bc50b0bc6a8124f19d1c3d4a0f0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Compilations&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.4.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1ddff92c47b04502fe2d5a6e0a87545cc8e4df54&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Core&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;390afcb6201d1d6ef85dbac9ca472d7f3d19628b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Linux.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;28985a918ff7b537daa912c49d7f907e6e82a104&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Net.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;e5225a52fa7ca6f5f2581bbb6db54a0ae9e5d529&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Postgre.Sql&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;ac9043342bfcab56689bff96bd5d8a03ba7c37c4&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Server.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;00d153ba2f6bbe0be3c67096565f07ce66cbe2e8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.UI2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;c11f384c065a51871155a1a59e77f69d49daad15&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Web.Client.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;7e4b02793685f3835231c46ea60c767c84b13366&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Web.Core&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.6.0.16&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;b604a24356f337f9d6806bc328d9980ea7020eed&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Tessa.Windows.V2&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.4.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;11ebf1f7a6c974915ac1575bbcc13d26ca8baa0f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Celigo.Service.Manager.NetSuite&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;7.1.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;16d256f3daf8982ea5a3d7cb469dfd824b5f4f9c&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Celigo.Service.Manager.NetSuite.REST&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.3.1&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d64b2da8fcc14c51d707acebbd4ebcf93eb55fd9&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;Celigo.Suite.Talk&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;7.1.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d2832302dc687e260354be8143c69fc90144dc9b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;DistributedLocks.AzureStorage.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.0.2&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;dfbb6853f84d78f989deba3235cef26f51fd4d70&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;EBBuildClient.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;1.0.92&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;5409be191e8cec6edaf111a5481b62ecd80205c7&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;LagoVista.CloudStorage.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;3.0.2287.946&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;1f3f9b4188ecf54a997a7d51ec8e21dbd3165df5&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Ai.speech&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;ed6e7868bfab896663c91a4b242dac93943c2d19&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Ai.vision&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;db57c5769ac4997c6d6cc06009b0c19864cd6886&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Apm.config&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;5798a6be7106029a2f6fca860dbfd96e3caa601d&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Appmgmtcontrol.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;7fbcfa699b56e55d2089294a1edd61cd55cbae61&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Certificates.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f3dd64b8314afab0d47f0859c6346b97670514b1&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Certificatesmanagement.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;194e0a759a52371c69af70ff98dd0d25ec44e69f&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Dashboard.service&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;83f9fb69c198e24ae67f67871269b088053285c0&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Databasetools.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;73e8cf24d205e6800a448f292cb90dd845f109f8&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Datalabeling.service&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d05d1aa8f90e145cda664a3b8823482c1e0a0e92&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.File.storage&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;67508b2a6cfa6532994e30f8924a1f2566c32f20&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;fabac069323a7521c37052c55c2abb0a7c28ee0a&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Ospgateway.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;250091edab3a9ec2f5d207b174677900f874aaad&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Osubbillingschedule.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;d52d9ad3a258ac47b33c58320303f65e0a366cd3&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Osuborganizationsubscription.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;dd00638e3a9201d645d96a97d0ebe58b73da5fef&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Osubsubscription.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;413c8f589aea0a1295f0dfb481f741eb3d7aa744&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Osubusage.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;50e5192337e5b8df41a31bc8daead884e7838d82&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Servicemanager.proxy&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f1acc14265a44ea98d5539885329e36a9c8bbd5b&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Threat.intelligence&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;9f57f74b0d586c74c3602de6ef404b76997d4785&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Usage.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;f9549c90de2134e2540aa44a043ed61fa202f9e5&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Visualbuilder.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;0979601ec510bf0c48563a63391a941fa62133b3&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 37.3382%; padding: 4px;"&gt;OCI.DotNetSDK.Waf.Net&lt;/td&gt; 
    &lt;td style="width: 14.8792%; padding: 4px; text-align: center;"&gt;73.0.0&lt;/td&gt; 
    &lt;td style="width: 47.7825%; padding: 4px;"&gt;e54ec3cbc36f4ee0832aa231df2de893d4329546&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fiamreboot-malicious-nuget-packages-exploit-msbuild-loophole&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Research</category>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 31 Oct 2023 11:30:00 GMT</pubDate>
      <author>karlo.zanki@reversinglabs.com (Karlo Zanki)</author>
      <guid>https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole</guid>
      <dc:date>2023-10-31T11:30:00Z</dc:date>
    </item>
    <item>
      <title>How mature is your open-source risk management? S2C2F helps map out dependencies</title>
      <link>https://www.reversinglabs.com/blog/the-s2c2f-aims-to-map-out-risk-from-oss</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/the-s2c2f-aims-to-map-out-risk-from-oss" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/openssf-s2c2f-map-out-oss-risk.jpg" alt="How mature is your open-source risk management? S2C2F helps map out dependencies" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;T&lt;span style="color: #1c1917; background-color: white;"&gt;he Secure Supply Chain Consumption Framework (S2C2F) from the Open Source Security Foundation (OpenSSF) is a useful resource for &lt;span&gt;enterprise software teams &lt;/span&gt;addressing risks from open-source dependencies. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/openssf-s2c2f-map-out-oss-risk.jpg?width=1400&amp;amp;height=732&amp;amp;name=openssf-s2c2f-map-out-oss-risk.jpg" width="1400" height="732" alt="openssf-s2c2f-map-out-oss-risk" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;T&lt;span style="color: #1c1917; background-color: white;"&gt;he Secure Supply Chain Consumption Framework (S2C2F) from the Open Source Security Foundation (OpenSSF) is a useful resource for &lt;span&gt;enterprise software teams &lt;/span&gt;addressing risks from open-source dependencies. &lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;The &lt;a href="https://openssf.org/blog/2022/11/16/openssf-expands-supply-chain-integrity-efforts-with-s2c2f/"&gt;framework &lt;/a&gt;provides a structured list of guidelines and best practices to protect development organizations from consuming vulnerable and compromised open-source software (OSS) components. It enumerates real-world open-source risks and recommends processes for identifying, evaluating, and monitoring them throughout &lt;a href="https://www.reversinglabs.com/glossary/software-development-life-cycle-sdlc"&gt;the software development lifecycle (SDLC)&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/securityengineering/opensource/practices#coreui-imagemodule-ux5k8s7"&gt;Microsoft developed the framework&lt;/a&gt; and used it for several years before turning it over to the OpenSSF to manage. Here's what you need to know about the S2C2F's strength in mapping out OSS risk. But there is one key caveat: Remediation of OSS risk is left to organizations to work out.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Join November 14 Webinar: &lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design - Why Trust Matters for Software Risk Management&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;8 focus areas and 4 &lt;/strong&gt;&lt;strong&gt;maturity levels &lt;/strong&gt;&lt;strong&gt;are key&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The recommendations are built around eight focus areas: ingest, inventory, update, enforce, audit, scan, rebuild, and fix+upstream. The S2C2F spells out requirements for each of the focus areas that organizations can implement to improve security processes in that area. The requirements, which range from the basic to the aspirational, are organized into four maturity levels.&lt;/p&gt; 
&lt;p&gt;By using the eight practices and four levels of the S2C2F, organizations have a road map to tell them where they are now and where they need to go. Matt Rose, field CISO at ReversingLabs, said the practices are a clear and concise explanation of where to do certain activities with OSS workflows to mitigate risks&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"It is basically like having Google Maps for mitigation of OSS threats. Without it, there is a ton of confusion on what to do when and where."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/mattarose"&gt;Matt Rose&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;S2C2F and SLSA work hand in hand&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The S2C2F is primarily consumer-focused, unlike another &lt;span&gt;framework for open-source security, &lt;/span&gt;Secure Software Supply Chain Levels for Artifacts (SLSA), which is focused primarily on software producers. The two, however, are complementary. While SLSA focuses on progressive levels of security for artifacts such as source code, the S2C2F recommends best practices for OSS consumers to address risks. &lt;a href="https://openssf.org/blog/2022/11/16/openssf-expands-supply-chain-integrity-efforts-with-s2c2f/"&gt;OpenSSF noted last year about the collaborative work&lt;/a&gt;:&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"One of its primary strengths, and why we were so excited to adopt it into the OpenSSF, is how well it pairs with any producer-focused framework such as SLSA. For example, S2C2F’s Level 3 requirement for provenance of all dependency artifacts can be achieved through generated artifact provenance in such a manner deemed trustworthy through SLSA."&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;S2C2F enables an incremental approach&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Because each S2C2F requirement maps to a specific maturity level, organizations have an opportunity to take an incremental approach to securing their open-source supply chain. For instance, requirements for Level 1 on the S2C2F scale include the ability for organizations to use package managers to automate the tracking and updating of open-source components, to maintain an inventory of their open software, and to scan them for vulnerabilities.&lt;/p&gt; 
&lt;p&gt;Organizations at Level 2 of the S2C2F maturity scale have technology for improving mean time to vulnerability remediation. At Level 3, the focus is on preventive controls and proactive code analysis to reduce risk from compromised or malicious open-source software. Organizations at the highest S2C2F maturity level (Level 4) have controls that can help mitigate against the most sophisticated attacks.&lt;/p&gt; 
&lt;p&gt;As the OpenSSF describes it, Level 1 requirements are fundamentally basic and include practices that many organizations have already implemented, while Level 4 requirements are challenging to implement and likely aspirational for most organizations today.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Getting proactive with app sec is key&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Callie Guenther, senior manager of cyberthreat research at cyber-risk monitoring firm Critical Start, said the S2C2F is designed to offer organizations a systematic approach to enhance the visibility of their open-source security posture.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"By emphasizing the importance of utilizing package managers and continuously inventorying OSS at its initial level, the framework provides a foundation for clear visibility into OSS components in use."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/callie-guenther-b643b6105"&gt;Callie Guenther&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;As organizations progress through the levels, the S2C2F guides them to integrate more proactive security measures such as verifying the provenance of dependency artifacts, which can enable deeper insights into the origin and integrity of OSS components, Guenther said.&lt;/p&gt; 
&lt;p&gt;The inclusion of requirements to bolster mean time to remediate vulnerabilities ensures that organizations can react swiftly to emerging security threats, Guenther said. Other requirements at the higher maturity levels — such as those focused on prevention and proactive risk analysis — mitigate against accidental consumption of malicious and compromised OSS components.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This proactive stance ensures security checks are ingrained in the workflow even before OSS consumption takes place. For projects of paramount importance, Level 4 ushers in advanced controls that serve to protect against sophisticated adversaries."&lt;br&gt;—Callie Guenther&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;John Gallagher, vice president of Viakoo Labs, said that with the S2C2F, the OpenSSF has given organizations a comprehensive framework to assess their maturity when it comes to open-source software. Having a maturity-model approach is critically important, especially when different parts of the organization are at different levels of maturity with open-source software, he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"A good example of this is with how organizations may be at a high level of maturity with their core IT systems, but are relatively immature when it comes to IoT security."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/b2bpipelinebuilder"&gt;John Gallagher&lt;/a&gt;&amp;nbsp;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-size: 24px;"&gt;&lt;strong&gt;Why software integrity verification matters&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;As with all frameworks, development organizations need to implement the S2C2F in a manner that is consistent with how they consume open-source components and how they develop applications, ReversingLabs' Rose said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"S2C2F is a great way for organizations to initiate a threat-based risk-reduction approach. However, it is just a framework to base your program on. It does not actually do the scanning or remediation of the threats. So more granular tooling is also needed."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;There's also the issue of verifying that software built with open-source components behaves in the manner intended. This is especially important when performing supplier and third-party assessments. Organizations cannot rely on a software producer's assurance that its software is secure; binary analysis of the actual software deployable is very important for commercial and third-party software assessments, Rose said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"That's because when you analyze a binary, you get a view of the entire application and not just a piece of the application. Binary code analysis is basically the final exam for all your software development processes, to ensure that the software you are developing is free from threats."&lt;br&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;John Bambenek, principal threat hunter at Netenrich, said context is important for organizations evaluating the S2C2F.&lt;strong&gt; &lt;/strong&gt;At present, the framework remains an early-stage effort. It provides guidance and principles to organizations looking to address their third-party open-source supply chain risks, but that's not a comprehensive approach.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"It’s built around eight practices and drives requirements from there. Therefore, it remains a little high-level for most organizations that can’t fill in the blanks on their own."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/johnbambenek"&gt;John Bambenek&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fthe-s2c2f-aims-to-map-out-risk-from-oss&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Thu, 26 Oct 2023 11:30:00 GMT</pubDate>
      <author>jaikumar.vijayan@gmail.com (Jaikumar Vijayan)</author>
      <guid>https://www.reversinglabs.com/blog/the-s2c2f-aims-to-map-out-risk-from-oss</guid>
      <dc:date>2023-10-26T11:30:00Z</dc:date>
    </item>
    <item>
      <title>App sec prioritization is priority No. 1 for CISOs</title>
      <link>https://www.reversinglabs.com/blog/why-application-security-prioritization-is-still-the-cisos-biggest-unsolved-problem</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/why-application-security-prioritization-is-still-the-cisos-biggest-unsolved-problem" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/app-sec-prioritization-prio-one.jpg" alt="App sec prioritization is priority No. 1 for CISOs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;&lt;br&gt;As application security and DevSecOps teams try to get the most bang for their app sec buck, one of the perennial problems has been figuring out where to focus their secure coding and vulnerability remediation efforts.&lt;/p&gt; 
&lt;p&gt;The scale of vulnerabilities that must be chased down in each application and the extent of the code that stretches across a typical enterprise portfolio of applications (and the enterprise's attendant software supply chain) make deciding on even the first step of prioritization a complex affair.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/app-sec-prioritization-prio-one.jpg?width=1400&amp;amp;height=732&amp;amp;name=app-sec-prioritization-prio-one.jpg" width="1400" height="732" alt="app-sec-prioritization-prio-one" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;br&gt;As application security and DevSecOps teams try to get the most bang for their app sec buck, one of the perennial problems has been figuring out where to focus their secure coding and vulnerability remediation efforts.&lt;/p&gt; 
&lt;p&gt;The scale of vulnerabilities that must be chased down in each application and the extent of the code that stretches across a typical enterprise portfolio of applications (and the enterprise's attendant software supply chain) make deciding on even the first step of prioritization a complex affair.&lt;/p&gt;  
&lt;p&gt;For the better part of a year, app sec veteran &lt;a href="https://www.linkedin.com/in/curphey/"&gt;Mark Curphey&lt;/a&gt; and his business partner &lt;a href="https://www.linkedin.com/in/viega/"&gt;John Viega&lt;/a&gt;, who have depth of experience in the app sec space, &lt;a href="https://www.linkedin.com/in/viega/"&gt;&lt;/a&gt;heard variations on this complaint time and again. Curphey founded OWASP and had a hand in founding the companies OpenRaven and SourceClear, acquired by Veracode. Viega founded Secure Software, which developed the app sec testing tool Fortify, bought by Hewlett-Packard.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Before launching their next venture, Curphey and Viega went on a listening tour with top CISOs to get at their biggest app sec pain points. Here is what they learned in those conversations.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ Join Nov. 14 Webinar:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/webinar/secure-by-design"&gt;Secure by Design: Why Trust Matters&amp;nbsp;&lt;/a&gt;| Learn more: &lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt;Software Supply Chain Risk Report&lt;/a&gt;&lt;a href="https://www.reversinglabs.com/blog/tools-gap-leaves-the-software-supply-chain-exposed-why-you-need-to-upgrade-your-application-security"&gt; &lt;/a&gt;]&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;Scan-and-fix is noisy and time-consuming&lt;/h2&gt; 
&lt;p&gt;Curphey and Viega found general agreement that app sec leaders and their CISO bosses are faced with more and more noise as &lt;a href="https://www.reversinglabs.com/blog/the-evolution-of-app-sec-how-to-get-off-the-hamster-wheel-of-scan-and-fix"&gt;the complexity of scan-and-fix keeps rising&lt;/a&gt;.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"We sat down with about 100 CSOs and we basically said, 'We're going to do an app sec company, so that's the scope, but within that what's your biggest unsolved problem?' And what we heard very consistently was, 'We've got all the money in the world. We've got all the tools in the world. We can hire people. But we have massive amounts of noise, so we don't know what we should work on.'"&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;One recent study bolsters this point. In the survey, conducted among 300 security professionals by Backslash Security, &lt;a href="https://www.backslash.security/appsec-survey-report"&gt;85% of respondents see being able to differentiate between real app sec risks and noise as critical to their success&lt;/a&gt;, but only 38% of them think their organization is able to do that. The biggest problem with their app sec tools? Almost half of the respondents (45%) said it was prioritizing findings, which takes a considerable amount of time given that they are "pretty noisy."&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Curphey said that one CSO on their tour summed it up with a simple formulation:&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"He said, 'If you could tell me what to work on now, next, or never, I'd write you a check right now.'"&lt;br&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;The context gap&lt;/h2&gt; 
&lt;p&gt;At many companies, security teams often run their tools on a piece of code without knowing whether that code is deployed in production, whether it has security fixes waiting to be deployed, and whether it is touching personally identifiable information (PII) or running critical business processes.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"All they have is this kind of myopic view of vulnerabilities."&lt;br&gt;—Mark Curphey&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;For many years, the only context available to organizations has been the criticality of vulnerabilities, but leaders seeking to prioritize their app sec efforts to gain better context about vulnerabilities — how they're deployed in the application stack, what kind of traffic is running through them, and how the application is used by the business. Curphey cited a game company he learned about during the tour.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"They have 6,300 repos, and they have no clue how many are in production. So they're scanning, and they're asking the developers to update the libraries in all 6,300. It's just noise. They don't need to be doing it. They don't know which ones are deployed into production, which ones have the highest traffic, or which one is touching PII."&lt;br&gt;—Mark Curphey&lt;br&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;How to kill noise&lt;/h2&gt; 
&lt;p&gt;Of all the contexts, knowing what is in production is one of the best ways to kill noise, the security leaders told Curphey.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"I think everyone historically — me included with SourceClear — focused on vulnerable libraries, and absolutely they are a problem. But the reality is that most of the vulnerable libraries never get put into production, so therefore it is just noise. You don't actually have to deal with it."&lt;br&gt;—Mark Curphey&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The point was brought home by the CISO of a large financial services company.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"They didn't know what repos were in production but they knew the vast majority weren't, so they told me, 'The first thing we'd like to do before we do anything is just kill the noise at the source so that we don't have to figure out deduping and all of that other stuff.' Their take was, 'I can get rid of 95% of the problems right off the bat with that knowledge.'"&lt;br&gt;—Mark Curphey&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;Most SBOM efforts are still busywork&lt;/h2&gt; 
&lt;p&gt;The general consensus from the listening tour on White House Executive Order 14028 on software bills of material (SBOMs) was that it is creating busywork for CISOs.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"You can generate one with your tool, but it's basically like writing your own doctor's certificate and signing it off yourself. It's totally easy to fake. Then, if you have one that happens at the build system, it is usually completely different than the one that's in the code repo and different from the one that runs in production, where you have hot loading and things like that."&lt;br&gt;—Mark Curphey&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;SBOMs are useful when you have attestation "and you have confidence that this SBOM is generated here, that one there, and so on," Curphey said. He explained that the fire drill of Log4j showed weakness in the narrative about SBOM usefulness.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Most people sent folks around with clipboards trying to find out where it was. And even when it was in production, they found it was in test directories where it wasn't being called into production. They spent all of this time, shut down dev teams, and I think there's scar tissue for a lot of CISOs, who are saying, 'We can't rely on a lot of this. We can use [SBOMs] to help feed things, but ultimately they're not a source of truth."&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;From tour to open-source tool&lt;/h2&gt; 
&lt;p&gt;Many of the observations from Curphey and Viega's tour have been folded into what Crash Override is doing with the release of its open-source security tool, Chalk, which collects metadata from build artifacts to provide queryable graphs that can help app sec teams get visibility into what part of a codebase is in production, as well as the context of how things are deployed.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fwhy-application-security-prioritization-is-still-the-cisos-biggest-unsolved-problem&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Wed, 25 Oct 2023 12:00:00 GMT</pubDate>
      <author>ericka@chickowski.com (Ericka Chickowski)</author>
      <guid>https://www.reversinglabs.com/blog/why-application-security-prioritization-is-still-the-cisos-biggest-unsolved-problem</guid>
      <dc:date>2023-10-25T12:00:00Z</dc:date>
    </item>
    <item>
      <title>GitHub boosts secrets scanning: A necessary step, but supply chain security is key to managing risk</title>
      <link>https://www.reversinglabs.com/blog/github-boosts-secrets-scanning-why-supply-chain-security-is-key</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/github-boosts-secrets-scanning-why-supply-chain-security-is-key" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/github-secrets-tokens.jpg" alt="GitHub boosts secrets scanning: A necessary step, but supply chain security is key to managing risk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Credentials leaks are a major threat to supply chain security. In the hands of an adversary, application development secrets will open the door to a host of attack strategies. &lt;a href="https://www.reversinglabs.com/blog/circleci-hack-is-a-red-flag-for-security-teams-on-the-software-supply-chain"&gt;The CircleCI hack&lt;/a&gt; made this crystal clear for software supply chain risk management.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/github-secrets-tokens.jpg?width=1400&amp;amp;height=732&amp;amp;name=github-secrets-tokens.jpg" width="1400" height="732" alt="github-secrets-tokens" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Credentials leaks are a major threat to supply chain security. In the hands of an adversary, application development secrets will open the door to a host of attack strategies. &lt;a href="https://www.reversinglabs.com/blog/circleci-hack-is-a-red-flag-for-security-teams-on-the-software-supply-chain"&gt;The CircleCI hack&lt;/a&gt; made this crystal clear for software supply chain risk management.&amp;nbsp;&lt;/p&gt;  
&lt;p&gt;Many potential leaks can be discovered through scanning software repositories. GitHub recognized that earlier this year when it began &lt;a href="https://github.blog/2023-02-28-secret-scanning-alerts-are-now-available-and-free-for-all-public-repositories/"&gt;offering secrets scanning free on the public repositories that it hosts. &lt;/a&gt;But scanning can create its own problems, especially when it comes to remediation of scanning results.&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;A key to remediation is determining whether tokens — which are used for things such as pushing and pulling code, creating and managing repositories, and opening and closing issues — are active or not, a process that can be ornery and time-consuming. GitHub is tackling that problem with its validity checks feature.&lt;/p&gt; 
&lt;p&gt;Validity checks remove a lot of the manual effort and friction from the remediation process. A token’s status can be seen within the UI, saving time and allowing remediation tasks to be prioritized so they can be performed more efficiently. That's especially useful when scanning produces hundreds or even thousands of alerts.&lt;/p&gt; 
&lt;p&gt;With its latest secrets security enhancement, GitHub is extending validity checks to select tokens on other platforms, namely Amazon's AWS, Microsoft, Google, and Slack. "These account for some of the most common types of secrets detected across repositories on GitHub," the platform's senior product marketing manager, Zain Malik, and senior product manager, Courtney Claessens, &lt;a href="https://github.blog/2023-10-04-introducing-secret-scanning-validity-checks-for-major-cloud-services/"&gt;&lt;span&gt;wrote in a blog post&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;GitHub's secrets-scanning efforts are a step in the&amp;nbsp;right direction and will help development teams reduce some secrets leaks. But managing the risk from secrets leaks is bigger than that — and &lt;a href="https://www.reversinglabs.com/blog/plugging-secrets-leaks-requires-protecting-the-full-software-and-technolgy-stack"&gt;requires a holistic software supply chain security approach&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See Special Report: &lt;a href="https://www.reversinglabs.com/secrets-exposed"&gt;An Essential Guide to Securing Secrets in Software&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;The importance of enhanced secrets scanning&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;There are many ways for software teams to leak development secrets, and many places to do so. So it's valuable for organizations to be able to scan as many places as they can, said Justin Cappos, a professor in the computer science and engineering department at NYU's Tandon School of Engineering.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"It's really good that [GitHub's] effort is looking in a broader way to secure the ecosystem of credentials API tokens and similar things."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://engineering.nyu.edu/faculty/justin-cappos"&gt;Justin Cappos&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;John Bambenek, a principal threat hunter at Netenrich, said such scanning has become increasingly important as organizations become more dependent on cloud services. “Traditional perimeter defenses and other security tools just aren’t available. “When you are talking APIs, it’s not even possible to deploy MFA [multifactor authentication].”&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Lost secrets give adversaries worldwide immediate access to your cloud data and services, and it requires minimal skills to scan repositories to find them."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/johnbambenek/"&gt;John Bambenek&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Philip George, executive technical strategist at Merlin Cyber, said GitHub’s extension of its security tools into popular cloud environments is welcome, what "with the growing amount of private and public sector organizations migrating workloads into the cloud."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“CI/CD pipelines will adjust accordingly and take advantage of the cloud's programmable infrastructure, which presents an even greater attack surface and overall risk of threat actors exploiting vulnerabilities posed by inadequate secrets management. &lt;span style="background-color: transparent;"&gt;However, choosing to extend validity checks and static cryptographic scanning tools across cloud service provider environments can be an effective way to manage this risk.”&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/philip-george-8934244/"&gt;Philip George&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;One key problem with secrets scanning: Alert fatigue&lt;/h2&gt; 
&lt;p&gt;As important as scanning has become, it often produces an avalanche of alerts. When security alerts become too noisy, legitimate alerts get lost — or worse, or they get ignored, Bambenek said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Rapid triaging to remove false positives is essential to prevent analysts from developing muscle memory in bulk closing tickets without sufficient thought."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—John Bambenek&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Such scans are known for creating false positives, but Tandon School of Engineering's Cappos said GitHub is “pretty good” at avoiding them. However, while things like credit card numbers are more easily identified, he said, it’s not always possible to tell whether something is a secret or not.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“For example, if I give you a nine-digit number, it could be someone's Social Security number, or it could just be a nine-digit number."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Justin Cappos&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;Secrets security demands a holistic approach&lt;/h2&gt; 
&lt;p&gt;As significant as the CircleCI hack of 2023 was, Philip George, executive technical strategist at Merlin Cyber, said &lt;a href="https://www.reversinglabs.com/blog/it-only-takes-one-line-of-code-to-ruin-your-day"&gt;the Codecov supply chain breach of 2021&lt;/a&gt; better illustrates the ramifications of inadequate secrets management.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Threat actors were able to obtain access to the targeted code repository, scan for production secrets and authenticators, then utilized the discovered secrets across production systems, resulting in direct access to protected data and widespread compromise of build and production code."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Philip George&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Preventing secrets compromises is essential to software supply chain security, George added. "Obtaining a level of zero trust coupled with continuous validation across the CI/CD pipeline and container environments will raise the level of assurance for the consumers at the end of the supply chain.”&lt;/p&gt; 
&lt;p&gt;While discovering secrets in software repositories is a good start in addressing the risk from leaked secrets, it’s only a start, because secrets can be exposed in many other places, Bambenek said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“I have found them in scripting wrapped around the DevOps workflow, stored in flat files, and even in scripts or other documents stored in SharePoint, OneDrive, or Google Drive. There are many digital equivalents of the ‘password on the Post-it note’ in the digital world, and many of those equivalents are also cloud services that can either be compromised or have overly permissive access controls.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—John Bambenek&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;George cited containers as another potential area of attack. “Ensuring that all facets of the container ecosystem are being scanned for secrets management compliance is equally as important as covering code repositories,” he said.&lt;/p&gt; 
&lt;p&gt;Modern software development environments are complex, and that means risk management needs bigger thinking.ReversingLabs Field CISO Matt Rose said it isn't just about the code or the compiled package, it's the technologies — the tooling— that actually poses the bigger threat to&amp;nbsp;organizations from things like secrets leaks.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt;"That's why the CircleCI hack was an eye opener to a lot of organizations out there."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;Secrets risk management: All together now&lt;/h2&gt; 
&lt;p&gt;Cappos said he's glad to see GitHub taking clear steps on security secrets in its repository, noting the fact that they are "the easiest targets in that space."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"There are other places they could look, but you get diminishing returns. What people are trying to do is target the easiest things and knock those out because you get the biggest bang for the buck."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Justin Cappos&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;While repository validation is an essential step, Rose said the secrets problem was also growing along with the complexity of modern software development — an organizational risk that could not be ignored.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Modern applications, software, and cloud infrastructures do not exist without secrets. The problem is that organizations are managing more and more secrets every day. Without prioritization of which secrets are most dangerous you may not be focusing on the right secrets and miss something."&lt;br&gt;—Matt Rose&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p style="font-weight: bold;"&gt;[ See Special Report:&amp;nbsp;&lt;a href="https://www.reversinglabs.com/secrets-exposed"&gt;An Essential Guide to Securing Secrets in Software&lt;/a&gt;&amp;nbsp;]&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fgithub-boosts-secrets-scanning-why-supply-chain-security-is-key&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <pubDate>Tue, 24 Oct 2023 11:30:00 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/github-boosts-secrets-scanning-why-supply-chain-security-is-key</guid>
      <dc:date>2023-10-24T11:30:00Z</dc:date>
    </item>
    <item>
      <title>Rust on Android goes bare metal: 3 key security benefits</title>
      <link>https://www.reversinglabs.com/blog/rust-geared-up-for-bare-metal-3-key-mobile-security-benefits</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/rust-geared-up-for-bare-metal-3-key-mobile-security-benefits" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/rust-android-security-gears.jpg" alt="Rust on Android goes bare metal: 3 key security benefits" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: left;"&gt;A milestone in the software industry's move toward &lt;a href="https://www.reversinglabs.com/blog/can-safer-programming-languages"&gt;safer programming languages&lt;/a&gt; was reached last week with Google's announcement that it is extending the use of Rust into bare-metal Android environments.&lt;/p&gt;</description>
      <content:encoded>&lt;p style="text-align: left;"&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/rust-android-security-gears.jpg?width=1400&amp;amp;height=732&amp;amp;name=rust-android-security-gears.jpg" width="1400" height="732" alt="rust-android-security-gears" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p style="text-align: left;"&gt;A milestone in the software industry's move toward &lt;a href="https://www.reversinglabs.com/blog/can-safer-programming-languages"&gt;safer programming languages&lt;/a&gt; was reached last week with Google's announcement that it is extending the use of Rust into bare-metal Android environments.&lt;/p&gt;  
&lt;p&gt;Google has been moving native Android code from C++ to Rust, which the company says has resulted in fewer security vulnerabilities. Most of that code runs in Linux. This move is about extending Rust beyond the Linux kernel.&lt;/p&gt; 
&lt;p&gt;Andrew Walbran, a member of the Android Rust team, &lt;a href="https://security.googleblog.com/2023/10/bare-metal-rust-in-android.html"&gt;&lt;span&gt;wrote in the Google Security Blog&lt;/span&gt;&lt;/a&gt; that many security-critical components of Android run in bare-metal environments — outside of Linux — and they are typically written in C. "As part of our efforts to harden firmware on Android devices, we are increasingly using Rust in these bare-metal environments, too."&lt;/p&gt; 
&lt;p&gt;To achieve this shift, Google has rewritten the Android Virtualization Framework’s protected virtual machine (pVM) firmware in Rust to provide a memory-safe foundation for the pVM root of trust. That firmware performs a function similar to a bootloader and was initially built on top of U-Boot, a widely used open-source bootloader, which Walbran said "was not designed with security in a hostile environment in mind."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"We fixed the specific issues we found in U-Boot, but by leveraging Rust we can avoid these sorts of memory-safety vulnerabilities in the future."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/andrew-walbran-a31a0322/"&gt;Andrew Walbran&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Google's use of Rust in bare-metal applications will make Android a safer platform and have a broader positive impact on the Rust community, industry experts noted. Here are three key takeaways from the move.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;1. Fewer memory safety issues&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;The move to extend Rust's use has the potential to make Android applications that utilize the Android Virtualization Framework (AVF) more secure by hardening the root of trust for the protected VMs, said Michael Mehlberg, CEO of Dark Sky Technology.&lt;/p&gt; 
&lt;p&gt;Mehlberg compared the AVF to Intel's Secure Enclave, which lets the Android application ship a section of code that will run in a separate virtual machine, be "completely isolated from the host Android platform, and only interacting with the base Android system through a very narrow interface."&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Using Rust in the pVM firmware will reduce memory safety issues in that interface between the protected virtual machine and, ultimately, the Android application that kicked off the computation in the pVM."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/mmehlberg/"&gt;Michael Mehlberg&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;He noted that the reduction in memory safety issues in the pVM firmware comes from Rust enforcing bounds-checking, as well as providing a strict ownership of memory by default. It also requires programmers to opt in to unsafe behaviors through specific code constructs that can be targeted for more stringent inspection during review.&lt;/p&gt; 
&lt;p&gt;Shane Miller, a senior fellow at the Atlantic Council and a distinguished advisor to the Rust Foundation, said that transitioning to Rust makes Android applications more secure.&amp;nbsp;&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Memory safety has a huge impact on security, so replacing unsafe code like C with memory-safe Rust substantially improves the security of Android applications. In every industry study, more than 50% of security vulnerabilities are attributable to a lack of memory safety in the code."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/shanemilleritmanager/"&gt;Shane Miller&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;2. A smaller attack surface&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Irena Bojanova, a computer scientist with the National Institute of Standards and Technology (NIST), said that by rewriting Android's pVM in Rust, Google is reducing the potential attack surface of the pVM's root of trust.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"A more secure pVM implies a stronger foundational security, which indirectly can make Android applications running on top of it safer."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/irenabojanova/"&gt;Irena Bojanova&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;However, Robert Schiela, technical manager of cybersecurity foundations at the Software Engineering Institute at Carnegie Mellon University, said the shift was limited by its reach. He noted that while Google's move has the potential to secure Android systems — and the applications running on them — it won’t necessarily do much to make the applications’ software packages individually more secure. But he also sees benefits in the development.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"It could prevent exploits that might enable an attacker to control the underlying system and possibly cross application or device boundaries they shouldn’t be able to. At least, it should reduce the chances of that happening even if it doesn’t prevent it."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/robertschiela/"&gt;Robert Schiela&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Joel Marcey, director of technology at the Rust Foundation, said the use of Rust in a bare-metal environment has a deep impact on securing Android itself.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"These bare-metal components, now written in Rust, are outside of a normal operating system, such as Linux, where actual user applications will run. &lt;span style="background-color: transparent;"&gt;Therefore, this change has the potential to further secure the Android environment itself, which is the first step in ensuring that everything running on top of Android can be secure as well."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/joelmarcey/"&gt;Joel Marcey&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;3. Benefits for the Rust ecosystem&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Dark Sky's Mehlberg said Google's move will have a bigger net benefit, by boosting Rust's usage more broadly. As more companies use Rust in bare-metal contexts, the ecosystem of Rust libraries that target bare metal will grow, and the existing bare metal–capable libraries will be enhanced through bug-fixes and features, he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Additionally, this will help drive the development of future Rust language features and patterns for working in bare-metal contexts."&lt;br&gt;—Michael Mehlberg&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;NIST's Bojanova said Google’s move is significant for the Rust programming language because “it demonstrates Rust's growing popularity and trust in the industry for security-critical applications.”&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Google's adoption of Rust for a critical component in Android virtualization will likely inspire other organizations to consider Rust for their projects, particularly when security is a top concern. This could lead to increased investment in Rust development, the creation of more libraries and tools, and a broader community of Rust developers.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Irena Bojanova&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Josh Amishav, founder and CEO of Breachsense, said Google's move will have a clear impact on the Rust universe. "Google's endorsement of Rust for such a critical component will validate Rust's capabilities in a real-world, large-scale setting,” he said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“This can serve as a case study and potentially motivate other organizations to consider Rust for similar use cases. As a result, the move will also lead to more developers getting interested in and contributing to the Rust ecosystem.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Josh Amishav&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;Rust's development: It takes a village&lt;/h2&gt; 
&lt;p&gt;While this isn’t the first release of a Rust implementation on bare metal, the Google Android team's transparency about the limitations of Rust’s safety features will have a huge impact on the Rust community’s ability to understand and prioritize future improvements, the Rust Foundation's Miller noted.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;“Google’s emphasis on collaborating with the Rust community to implement those improvements also makes the delivery of that work more achievable and improves the security of all Rust implementations. Google’s model for responsible use of open-source software has a huge impact on the Rust universe.”&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Shane Miller&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Frust-geared-up-for-bare-metal-3-key-mobile-security-benefits&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dev &amp; DevSecOps</category>
      <pubDate>Thu, 19 Oct 2023 15:26:39 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/rust-geared-up-for-bare-metal-3-key-mobile-security-benefits</guid>
      <dc:date>2023-10-19T15:26:39Z</dc:date>
    </item>
    <item>
      <title>The evolution of app sec: Getting off the scan-and-fix hamster wheel remains elusive</title>
      <link>https://www.reversinglabs.com/blog/the-evolution-of-app-sec-how-to-get-off-the-hamster-wheel-of-scan-and-fix</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.reversinglabs.com/blog/the-evolution-of-app-sec-how-to-get-off-the-hamster-wheel-of-scan-and-fix" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.reversinglabs.com/hubfs/hamster-wheel-scan-fix-evolution-app-sec.jpg" alt="The evolution of app sec: Getting off the scan-and-fix hamster wheel remains elusive" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Over the last 20 years, cybersecurity has changed a lot, but one thing has remained resistant to change: scanning resources for defects and fixing them. Now may be the time to hop off that scan-and-fix &lt;span&gt;hamster wheel,&lt;/span&gt;&amp;nbsp;argues Chris Romeo, CEO of the threat modeling company Devici, &lt;a href="https://www.youtube.com/watch?v=AMfNzGicIqA"&gt;in a recent Security Table &lt;span&gt;podcast&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://www.reversinglabs.com/hs-fs/hubfs/hamster-wheel-scan-fix-evolution-app-sec.jpg?width=1400&amp;amp;height=732&amp;amp;name=hamster-wheel-scan-fix-evolution-app-sec.jpg" width="1400" height="732" alt="hamster-wheel-scan-fix-evolution-app-sec" style="height: auto; max-width: 100%; width: 1400px;"&gt;&lt;/p&gt; 
&lt;p&gt;Over the last 20 years, cybersecurity has changed a lot, but one thing has remained resistant to change: scanning resources for defects and fixing them. Now may be the time to hop off that scan-and-fix &lt;span&gt;hamster wheel,&lt;/span&gt;&amp;nbsp;argues Chris Romeo, CEO of the threat modeling company Devici, &lt;a href="https://www.youtube.com/watch?v=AMfNzGicIqA"&gt;in a recent Security Table &lt;span&gt;podcast&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;  
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"This pattern is just wrong. It's broken. We've seen a history of the challenges following this pattern does in working with developers."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/securityjourney/"&gt;Chris Romeo&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Travis McPeak, co-founder and CEO of the policy-as-code tools company Resourcely, seconded Romeo's call for a reset in commenting on &lt;a href="https://www.linkedin.com/posts/securityjourney_the-hamster-wheel-of-scan-and-fix-why-activity-7110432523414896640-e8-L/"&gt;Romeo's LinkedIn &lt;span&gt;post&lt;/span&gt;&amp;nbsp;on the subject&lt;/a&gt;.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"You're singing my song. Scan and fix sucks. &lt;span style="background-color: transparent;"&gt;We'll always be in reactive, vulnerability management hell. As an industry, we're pretty bad at vulnerability management. Sixty percent of breaches involve known vulnerabilities."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/travismcpeak/"&gt;Travis McPeak&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;But wait. Wasn't "shifting left" — moving security functions closer to the beginning of the application development lifecycle — supposed to derail the hamster wheel by averting security problems that needed fixing? "No," Romeo argues in his LinkedIn piece. "It just recommends starting the hamster wheel earlier," he wrote.&lt;/p&gt; 
&lt;p&gt;When will application security evolve? Experts say replacing scan-and-fix could remain elusive. But tools are emerging that could slow that hamster wheel and provide prioritization and automation.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;[ See special report: &lt;a href="https://www.reversinglabs.com/the-evolution-of-application-security"&gt;The Evolution of App Sec&lt;/a&gt; | See Webinar: &lt;a href="https://www.reversinglabs.com/webinar/why-app-sec-tools-fail-at-software-supply-chain-security"&gt;Why AST fails at supply chain security&lt;/a&gt; ]&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Are RASP and IASP the answer?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;What about using app sec tools that don't scan and fix, but rather view and block or allow? Could applying the techniques used by runtime application security protection (RASP) and &lt;a href="https://www.reversinglabs.com/glossary/interactive-application-security-testing-iast"&gt;interactive application security testing (IAST)&lt;/a&gt; tools be the answer?&lt;/p&gt; 
&lt;p&gt;Jeff Williams, co-founder and CTO of Contrast Security, said RASP actually does "fix" flaws, although it does it at a different — and better — location. For example, instead of trying to fix every SQL query everywhere (which will never happen), RASP adds a trust boundary to database access methods to detect when untrusted data modifies the meaning of a query — essentially the definition of a SQL injection attack, he explained.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"So with RASP, you get both visibility into who is attacking, what vectors they are using, which vulnerabilities they have discovered, and really strong protection against exploit. &lt;span style="background-color: transparent;"&gt;The typical 'fix' — replacing with a parameterized query — thwarts the attacks, but you get no visibility. And you have to modify all of the queries."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/planetlevel/"&gt;Jeff Williams&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Romeo said RASP and IAST won't work in practice as alternative to scan-and-fix, however.&lt;/p&gt; 
&lt;p&gt;"We’d have to embed static application security testing (SAST) into the runtime of the application, where it scans the code as it’s used and blocks the request if there was a code-based flaw. I’ve already talked myself out of this option for many reasons."&lt;/p&gt; 
&lt;p&gt;Those reasons include a hit on performance and the placement of a security control in a strange place, Romeo said.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;What about an IDE solution?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Another place to break the scan-and-fix pattern might be in the integrated development environment (IDE).&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;&lt;em&gt;&lt;span style="font-size: 24px;"&gt; "If we could introduce the scanning function into the IDE in real time, we should be able to sound a buzzer and get the developer to fix the problem in real time so we get away from the stack of issues."&lt;br&gt;—Chris Romeo&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;However, all that buzzing is likely to break developers' workflow and hurt their productivity, Romeo said. "This still doesn’t feel like the answer to our industry’s woes."&lt;/p&gt; 
&lt;p&gt;Paul Hodgkinson, a security specialist at GitHub Advanced Security, said that having security alerts and fixes in an IDE would be effective — but also pose problems.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"[Getting] consistency in using alerts in IDEs is very hard. You’ll never get 100% compliance in most teams. That means you always have to follow it up with checks in the code review pipeline, such as at [pull request] time or in&amp;nbsp; [continuous integration] for those who don’t do [pull requests]."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/paul-h-579a1a243/"&gt;Paul Hodgkinson&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Hodgkinson added that real-time scans have a trade-off of the usual triad of speed/quality/cost. "Deep SAST analysis with dataflow and taint, and accurate representation of the code takes time and is expensive in processing, relative to fast scans that can give you partial results," he wrote in response to Romeo's post.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Some tools claim they can operate in your IDE&amp;nbsp;but then farm the work off to a server and you eat the resulting costs. Some tools claim to operate in your IDE, but they're anemic cut-down tools that don't satisfy."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Paul Hodgkinson&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2&gt;&lt;strong&gt;What about AI?&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Artificial intelligence (AI) seems to be the answer to all the world's problems these days. Could AI offer an alternative to scan-and-fix? Might an AI tool scan and introduce PRs/fixes that relieve the ignored issues problem?&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"[Even] with AI, we’re still talking about scan-and-fix. It's just fancy robot fixing."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—Chris Romeo&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;h2 style="font-weight: bold;"&gt;So what's so bad about scan-and-fix after all?&lt;/h2&gt; 
&lt;p&gt;During the Security Table podcast, there was some pushback to Romeo's criticism of scan-and-fix from Izar Tarandach, a senior staff engineer at the monitoring and security platform Datadog.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Scan-and-fix, by itself, is not a bad thing. &lt;span style="background-color: transparent;"&gt;It may generate results that are not optimal, but if you add context by understanding more and more about where that scan is happening, you're going to have shorter, prioritized, contextualized cycles of fix."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/izartarandach/"&gt;Izar Tarandach&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;So rather than breaking the pattern — which still has value, especially as the knowledge we have gets better — "it becomes a problem of prioritization," &lt;span style="background-color: transparent;"&gt;Tarandach&lt;/span&gt; said.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Smarter app sec tools are emerging&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;ReversingLabs field CISO Matt Rose said the problem with the hamster wheel of scanning and fixing is its focus is on identification over remediation.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"Organizations are typically great at identification but less effective at remediation. The best way to address remediation is by having a clearly defined and understood security policy that defines what risks you care about and what risks are not important. This saves time, money, and resources."&lt;/em&gt;&lt;br&gt;&lt;em&gt;—&lt;a href="https://www.linkedin.com/in/mattarose/"&gt;Matt Rose&lt;/a&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;The main problem with scan-and-fix is noise — lots of alerts, lots of false positives, lots of&amp;nbsp;false negatives, said Matthew Coles, Product Security Engineer at Dell Technologies, during the roundtable.&lt;/p&gt; 
&lt;p&gt;The way you solve that is you make the results prioritized, more actionable — and less noisy, Coles said.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p style="font-size: 24px;"&gt;&lt;em&gt;"So you need the tools to be smarter because that will reduce the noise and allow humans to make intelligent decisions about what to fix first. B&lt;span style="background-color: transparent;"&gt;ut you're not going to ever solve the problem because developers are introducing bugs into the system. Until that stops, you're going to have to have analysis."&lt;br&gt;—&lt;a href="https://www.linkedin.com/in/matthew-coles-4330652/"&gt;Matthew Coles&lt;/a&gt;&lt;/span&gt;&lt;/em&gt;&lt;/p&gt; 
&lt;/blockquote&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=3375217&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.reversinglabs.com%2Fblog%2Fthe-evolution-of-app-sec-how-to-get-off-the-hamster-wheel-of-scan-and-fix&amp;amp;bu=https%253A%252F%252Fwww.reversinglabs.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>AppSec &amp; Supply Chain Security</category>
      <category>Dev &amp; DevSecOps</category>
      <pubDate>Thu, 12 Oct 2023 17:10:44 GMT</pubDate>
      <author>jpmellojr@gmail.com (John P. Mello Jr.)</author>
      <guid>https://www.reversinglabs.com/blog/the-evolution-of-app-sec-how-to-get-off-the-hamster-wheel-of-scan-and-fix</guid>
      <dc:date>2023-10-12T17:10:44Z</dc:date>
    </item>
  </channel>
</rss>
