Charlie Eriksen Profile
Charlie Eriksen

@CharlieEriksen

Followers
2K
Following
676
Media
88
Statuses
3K

Security Researcher @AikidoSecurity. Founder @weaseljs. Previously @SecCodeWarrior, co-founder at Adversaryio & Principal Security Engineer/Partner @thesyndis

Amsterdam
Joined December 2008
Don't wanna be here? Send us removal request.
@CharlieEriksen
Charlie Eriksen
11 days
The package reference is quite popular, according to our data from @AikidoSecurity's Threat Intel. Yet somehow it never triggered, I guess?. Why did they change the payload now? Why has the package survived for 8 months? That's very strange.
0
0
2
@CharlieEriksen
Charlie Eriksen
11 days
Interesting situation: Somebody has sat on a dependency confusion package targeting the name `airflow-www` for 8 months, which included an install tracking payload. Then deleted that and uploaded a reverse shell version in its place.
1
0
2
@CharlieEriksen
Charlie Eriksen
24 days
RT @cyb3rjerry: The phishing domain used in the num2words package compromise is https[://]pypj[.]org/.
0
3
0
@CharlieEriksen
Charlie Eriksen
24 days
RT @SFLinux: @cyb3rjerry @johnk3r @MalwareUtkonos @InvokeReversing I found a weird token in our pypi account, probably the attacker had cre….
0
3
0
@CharlieEriksen
Charlie Eriksen
24 days
The Scavenger threat actors managed to compromise num2words. The maintainers removed the malicious package, and the threat actors published another package. Ouch. The package has ~700k weekly downloads. So that's a lot of exposure.
0
4
11
@CharlieEriksen
Charlie Eriksen
24 days
RT @cyb3rjerry: A new version (0.5.16) of num2words has been published and is still malicious. Looks like the cleanup was not successful.
0
1
0
@CharlieEriksen
Charlie Eriksen
24 days
RT @cyb3rjerry: This is indeed Scavenger, heads up! Solid catch @johnk3r .Here are the new C2 domains:.- https[://]pokerainteasy[.]su.- htt….
0
2
0
@CharlieEriksen
Charlie Eriksen
24 days
RT @SFLinux: @johnk3r @MalwareUtkonos @cyb3rjerry @InvokeReversing Thanks for the heads up! There was a phishing attack on pypi this mornin….
0
2
0
@CharlieEriksen
Charlie Eriksen
24 days
RT @johnk3r: 🛑 Heads-up: #num2words v0.5.15 (just dropped on PyPI) may be #compromised. Early signs probably link it to #Scavenger, the sa….
0
18
0
@CharlieEriksen
Charlie Eriksen
29 days
RT @chenleidev: update: aiting for GitHub/npmjs engineers to restore stylus access.
Tweet media one
0
5
0
@CharlieEriksen
Charlie Eriksen
29 days
For reference, the malicious packages by `panya` happened 12 days ago. And npm only took action today. @AikidoSecurity Intel detected the three malicious packages and automatically flagged them as malware within 5 minutes of their publication. 👏👏.
0
1
4
@CharlieEriksen
Charlie Eriksen
29 days
Wow, what a wild week. First, the phishing campaign against npm maintainers. Now the `stylus` package being pulled down due to a maintainer publishing dependency confusion packages, and `stylus` getting caught in the crossfire. Lots of builds out there are breaking. 🔥🚒.
1
0
9
@CharlieEriksen
Charlie Eriksen
1 month
RT @AikidoSecurity: Introducing Aikido SafeChain 🔒⛓️. SafeChain wraps every npm, yarn, pnpm, and npx install. It blocks malware in real tim….
0
4
0
@CharlieEriksen
Charlie Eriksen
1 month
Also, is this the last time I travel out of town for more than 12 hours without a laptop? Yeah. Threat hunting on a phone is the stuff of nightmares. 😭.
0
1
4
@CharlieEriksen
Charlie Eriksen
1 month
RT @MalwareUtkonos: @CharlieEriksen There are more than that. Here are all the DLLs that I have found so far
Tweet media one
0
3
0
@CharlieEriksen
Charlie Eriksen
1 month
Real talk though. Maybe it’s time to shift my work schedule to take weekend during the work week. All these big incidents right up to the weekend is looking like a trend 🙃.
0
1
2
@CharlieEriksen
Charlie Eriksen
1 month
RT @MalwareUtkonos: @Ax_Sharma got-fetch also contains a malicious DLL of the same malware family called "crashreporter.dll".30295311d62893….
0
4
0
@CharlieEriksen
Charlie Eriksen
1 month
Busy day. Finally had a chance to do a bit of threat hunting on the eslint-config-prettier attack. The same threat actor compromised got-fetch two days ago, version 5.1.11 and 5.1.12. The malicious versions are still live.
1
2
9
@CharlieEriksen
Charlie Eriksen
1 month
It is also significant to note that this is one of the best-documented cases of a targeted phishing attack against an important maintainer in the npm ecosystem. The domain was registered 5 days ago. Lots of lessons to be learned from this across the whole ecosystem.
@AikidoSecurity
Aikido Security
1 month
🚨 5 popular NPM packages totalling over 95m weekly downloads were compromised with malware due to a stolen NPM token. eslint-config-prettier .-- Versions: 8.10.1 - 9.1.1 - 10.1.6 - 10.1.7|. eslint-plugin-prettier.-- Versions: 4.2.2 - 4.2.3. synckit - .-- Version 0.11.9.
1
0
5