<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: fathul </title>
    <description>The latest articles on Forem by fathul  (@fathulands).</description>
    <link>https://forem.com/fathulands</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F692260%2F9a1ae28a-dbaf-475c-b45f-76d4c4296629.jpg</url>
      <title>Forem: fathul </title>
      <link>https://forem.com/fathulands</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/fathulands"/>
    <language>en</language>
    <item>
      <title>summary and analysis of the supply chain attack targeting the React Native development ecosystem</title>
      <dc:creator>fathul </dc:creator>
      <pubDate>Tue, 10 Jun 2025 18:18:50 +0000</pubDate>
      <link>https://forem.com/fathulands/summary-and-analysis-of-the-supply-chain-attack-targeting-the-react-native-development-ecosystem-1bfp</link>
      <guid>https://forem.com/fathulands/summary-and-analysis-of-the-supply-chain-attack-targeting-the-react-native-development-ecosystem-1bfp</guid>
      <description>&lt;p&gt;&lt;strong&gt;🧪 Incident: NPM Package Compromise&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Target: 16 popular npm packages maintained by the GlueStack project, widely used in React Native development&lt;/li&gt;
&lt;li&gt;Attack Type: Supply-chain malware injection&lt;/li&gt;
&lt;li&gt;Scale: Nearly 1 million downloads per week collectively&lt;/li&gt;
&lt;li&gt;Affected Packages: Not all disclosed yet, but include components of GlueStack CLI and DevOps plugins&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;🐛 Identified Malicious Activity  *&lt;/em&gt;                                                                                  &lt;/p&gt;

&lt;p&gt;📦 Malicious code injection  | Malicious script embedded into modules, triggered via postinstall hook during installation&lt;br&gt;
🌐 C2 Communication   | Sends user data (tokens, environment variables, system info) to external command &amp;amp; control servers&lt;br&gt;
📁 Environment exfiltration   | Exfiltrates .env files, API credentials, and build configuration details&lt;br&gt;
🪤 Stealth mechanism  | Obfuscated code that only activates in specific environments (e.g., CI/CD pipelines)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;⚙️ Potential Impact&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;💻 Developer Projects | Web/mobile apps can be silently tampered with during build process&lt;br&gt;
🔑 Credential Leakage | Leakage of AWS, Firebase, Supabase, GitHub tokens, etc.&lt;br&gt;
🏢 Enterprise Systems | Supply-chain compromise in DevOps pipeline may cause systemic risks&lt;br&gt;
📲 End Users  | Compromised apps could reach app stores and consumer devices&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛡️ Security Recommendations for Developers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🔄 Immediate Actions:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Audit project dependencies (especially GlueStack CLI, starter kits, plugins)&lt;/li&gt;
&lt;li&gt;Run npm audit and scan with tools like Socket.dev or Snyk&lt;/li&gt;
&lt;li&gt;Rotate .env files and API tokens if any affected packages were used&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🔐 Long-term Prevention:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enforce lockfile auditing (package-lock.json, yarn.lock)&lt;/li&gt;
&lt;li&gt;Use npm ci to prevent unexpected dependency changes&lt;/li&gt;
&lt;li&gt;Isolate CI/CD environments from the internet during builds&lt;/li&gt;
&lt;li&gt;Enable 2FA on npm and GitHub accounts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🧠 Additional Notes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This attack resembles previous incidents such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ua-parser-js compromise (2021)&lt;/li&gt;
&lt;li&gt;event-stream backdoor (2018)
Reinforces that developer tools themselves can be a prime attack vector&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;✅ Conclusion&lt;/strong&gt;&lt;br&gt;
The GlueStack package compromise underscores that the software supply chain is a critical attack surface. In modern DevOps and CI/CD environments, a single infected module can silently corrupt entire application ecosystems.&lt;/p&gt;

&lt;p&gt;📎 Full article: PPHM News Article&lt;br&gt;
&lt;a href="https://pphmnews.com/articles/cyber-attacks/popular-dev-tools-hijacked-in-stealth-malware-campaign" rel="noopener noreferrer"&gt;https://pphmnews.com/articles/cyber-attacks/popular-dev-tools-hijacked-in-stealth-malware-campaign&lt;/a&gt;&lt;/p&gt;

</description>
      <category>gluestack</category>
      <category>npm</category>
      <category>reactnative</category>
      <category>website</category>
    </item>
    <item>
      <title>stay srong</title>
      <dc:creator>fathul </dc:creator>
      <pubDate>Thu, 26 Aug 2021 08:31:06 +0000</pubDate>
      <link>https://forem.com/fathulands/stay-srong-14bl</link>
      <guid>https://forem.com/fathulands/stay-srong-14bl</guid>
      <description>&lt;p&gt;first post&lt;/p&gt;

</description>
      <category>firstpost</category>
    </item>
  </channel>
</rss>
