Threat Hunting Insights

The specific malicious packages we identified and how we found them

Featured Articles

Flexible policy enforcement with Minder profile selectors

Dan Barr /
4 mins read
/
Sep 19, 2024
Flexible policy enforcement with Minder profile selectors

Profile selectors, now available in Minder, enable you to customize how profiles are applied to your software supply chain. With selectors, you can apply the right rules to the right resources to increase compliance flexibility and reduce alert fatigue.


Cross-platform RAT deployed by weaponized 'requests' clone

Luke Hinds / Poppaea McDermott /
5 mins read
/
Aug 30, 2024

On August 29th, Stacklok’s automated threat detection platform alerted us to the presence of malicious code in a newly published PyPI package named "invokehttp." This package raised red flags due to inconsistencies in its metadata and the absence of any verified connection to its claimed GitHub repository. The attacker opted to link the package to a popular Selenium ChromeDriver GitHub repository. This has the same effect of exploiting the repository’s high number of stars, forks, and followers, adding a layer of credibility to invokehttp.


5 risk factors of open source software beyond CVEs

Stacklok Editorial Team /
6 mins read
/
Aug 20, 2024

The presence or lack of software vulnerabilities, or CVEs, isn't the only way to determine whether open source software is "safe" to use. In this post, we'll explore other risk factors that you should evaluate to determine which dependencies to use in your software projects.


Loading...
This Month in Minder - September 2024

This Month in Minder: September 2024

Stacklok /
Sep 26, 2024
Continue Reading
Flexible policy enforcement with Minder profile selectors

Flexible policy enforcement with Minder profile selectors

Dan Barr /
Sep 19, 2024
Continue Reading

Dependency hijacking: Dissecting North Korea’s new wave of DeFi-themed open source attacks targeting developers

Poppaea McDermott /
Sep 10, 2024
Continue Reading

Securi-Taco Tuesday livestream recap: How code signing and Sigstore secure the software supply chain

Stacey Potter /
Sep 3, 2024
Continue Reading

Cross-platform RAT deployed by weaponized 'requests' clone

Luke Hinds / Poppaea McDermott /
Aug 30, 2024
Continue Reading

Now available in Trusty: Vulnerability and license information for open source packages

Megan Bruce /
Aug 27, 2024
Continue Reading

Open source licenses 101: What is the GNU GPL License?

Stacklok Editorial Team /
Aug 26, 2024
Continue Reading

Open source licenses 101: What is an MIT License?

Stacklok Editorial Team /
Aug 23, 2024
Continue Reading

5 risk factors of open source software beyond CVEs

Stacklok Editorial Team /
Aug 20, 2024
Continue Reading