Skip to content

[Challenge Submission] <Malicious Code Packages> #8

@kavehtehrani

Description

@kavehtehrani

📌 Challenge Overview

Challenge Title:
(e.g., Malicious Code Packages)

Difficulty Level:

  • Beginner
  • Intermediate
  • Advanced

Description / Scenario:
Attackers hide as helpful and friendly open-source contributors and hijacking software packages that rely on open-source contributions.

Learning Objective:
Verify packages in code development, including updates to existing ones.

Phishing Technique Used:

Attackers try to poison published packages via publishing packages with a similar name that potentially confuses users. Normally if the package itself was searched the users could discern the real vs fake ones easier but more sophisticated methods involved attackers posing as genuine open-source contributors and burying the malicious package swap in a mountain of other actually genuine contributions. A sophisticated and recent attack targeting a vs code extension via a pull request that was merged is detailed here:

https://www.reversinglabs.com/blog/malicious-pull-request-infects-vscode-extension

Another similar one that targets IDE extensions is here:
https://securelist.com/open-source-package-for-cursor-ai-turned-into-a-crypto-heist/116908/

📸 Screenshots / Demo

Image

🪙 Reward Wallet Address (USDT - ERC20 Polygon/Arbitrum)

ktehrani.eth


✅ By submitting this challenge, I agree to open-source it under the project's license and allow the Unphishable team to modify or improve it for consistency.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions