Categories: Insur. Cyber

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft


Ravie LakshmananMay 01, 2026Supply Chain Attack / Malware

A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence.

The activity has been attributed to the GitHub account “BufferZoneCorp,” which has published a set of repositories that are associated with malicious Ruby gems and Go modules. As of writing, the packages have been yanked from RubyGems, and the Go modules have been blocked. The names of the libraries are listed below –

  • Ruby:
    • knot-activesupport-logger
    • knot-devise-jwt-helper
    • knot-rack-session-store
    • knot-rails-assets-pipeline
    • knot-rspec-formatter-json
    • knot-date-utils-rb (Sleeper gem)
    • knot-simple-formatter (Sleeper gem)
  • Go:
    • github(.)com/BufferZoneCorp/go-metrics-sdk
    • github(.)com/BufferZoneCorp/go-weather-sdk
    • github(.)com/BufferZoneCorp/go-retryablehttp
    • github(.)com/BufferZoneCorp/go-stdlib-ext
    • github(.)com/BufferZoneCorp/grpc-client
    • github(.)com/BufferZoneCorp/net-helper
    • github(.)com/BufferZoneCorp/config-loader
    • github(.)com/BufferZoneCorp/log-core (Sleeper module)
    • github(.)com/BufferZoneCorp/go-envconfig (Sleeper module)

The identified packages masquerade as recognizable and well-known modules like activesupport-logger, devise-jwt, go-retryablehttp, grpc-client, and config-loader so as to evade detection and trick users into downloading them.

“The account is part of a software supply chain campaign targeting developers, CI runners, and build environments across two ecosystems,” Socket security researcher Kirill Boychenko said in an analysis published today.

The Ruby gems are designed to automate credential theft during install time, harvesting environment variables, SSH keys, AWS secrets, .npmrc, .netrc, GitHub CLI configuration, and RubyGems credentials. The stolen data is then exfiltrated to an attacker-controlled Webhook(.)site endpoint.

On the other hand, the Go modules harbor broader capabilities to tamper with GitHub Actions workflows, plant fake Go wrappers, steal developer data, and add a hard-coded SSH public key to “~/.ssh/authorized_keys” for remote access to the compromised host. The modules do not all have the same payload; instead, they are spread across the cluster.

“The module executes through init(), detects GITHUB_ENV and GITHUB_PATH, sets HTTP_PROXY and HTTPS_PROXY, writes a fake go executable into a cache directory, and appends that directory to the workflow path so the wrapper is selected before the real binary,” Boychenko explained.

“That wrapper can then intercept or influence later go executions while still passing control to the legitimate binary to avoid breaking the job.”

Users who have installed the packages are advised to remove them from their systems, review for signs of access to sensitive files or unauthorized changes to “~/.ssh/authorized_keys,” rotate exposed credentials, and inspect network logs for outbound HTTPS traffic to the exfiltration point.



Source link
nabeelhassan565@gmail.com

Share
Published by
nabeelhassan565@gmail.com

Recent Posts

Transmission, symptoms, treatment: why is the Ebola epidemic affecting the Democratic Republic of Congo worrying?

This is the 17th epidemicebola in the Democratic Republic of Congo since the disease was…

6 heures ago

NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE

Ravie LakshmananMay 17, 2026Server Security / Vulnerability A newly disclosed security flaw impacting NGINX Plus…

12 heures ago

Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt

Ravie LakshmananMay 17, 2026Data Breach / Cybercrime Grafana has disclosed that an "unauthorized party" obtained…

17 heures ago

Tea and microbiota: what benefits for the intestinal flora?

The intestinal microbiota is at the heart of your health. Good news: certain everyday actions…

19 heures ago

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

Ravie LakshmananMay 16, 2026Vulnerability / Website Security A critical security vulnerability impacting the Funnel Builder…

1 jour ago

Can you eat onions when you have cholesterol?

Raw or cooked, the onion is a food that leaves no one indifferent because of…

1 jour ago