• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New Timing Attack Against NPM Registry API Could Expose Private Packages

You are here: Home / Cyber Security News / New Timing Attack Against NPM Registry API Could Expose Private Packages

A novel timing attack found in opposition to the npm’s registry API can be exploited to perhaps disclose personal deals applied by corporations, putting developers at risk of provide chain threats.

“By developing a record of probable package names, risk actors can detect organizations’ scoped non-public packages and then masquerade general public offers, tricking workers and users into downloading them,” Aqua Security researcher Yakir Kadkoda reported.

The Scoped Confusion attack banking institutions on examining the time it takes for the npm API (registry.npmjs[.]org) to return an HTTP 404 mistake information when querying for a personal bundle, and measuring it versus the reaction time for a non-existing module.

“It will take on normal less time to get a reply for a non-public package that does not exist when compared to a personal offer that does,” Kadkoda stated.

The plan, finally, is to recognize packages internally utilised by providers, which could then be utilized by threat actors to create general public versions of the identical deals in an try to poison the software program supply chain.

The newest conclusions are also diverse from dependency confusion assaults in that it necessitates the adversary to 1st guess the non-public deals utilised by an firm and then publish phony deals with the very same identify underneath the general public scope.

Dependency confusion (aka namespace confusion), in distinction, relies on the fact that offer managers check out general public code registries for a package in advance of non-public registries, ensuing in the retrieval of a malicious better version package from the public repository.

Aqua Security claimed it disclosed the bug to GitHub on March 8, 2022, prompting the Microsoft-owned subsidiary to issue a reaction that the timing attack will not be fixed because of to architectural restrictions.

As preventive measures, it’s advisable that businesses routinely scan npm and other deal management platforms for lookalike or spoofed offers that masquerade as the inside counterparts.

“If you don’t discover community packages equivalent to your internal packages, think about making general public deals as placeholders to avert these assaults,” Kadkoda mentioned.

Observed this posting exciting? Stick to THN on Facebook, Twitter  and LinkedIn to browse extra unique material we post.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « UK Government Urges Action to Enhance Supply Chain Security
Next Post: New Chinese Malware Attack Framework Targets Windows, macOS, and Linux Systems »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks
  • Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
  • Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
  • Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
  • Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

Copyright © 2025 · AllTech.News, All Rights Reserved.