Skip to content

Urgent: Sophisticated Attack Hits RubyGems, Stealing Bitcoin via Malicious Image Files

Stealthy malware targets RubyGems users. Bitcoin addresses replaced, funds stolen. Act now to protect your systems.

In this picture there is a bottle of cool drink and RISK word is written at the top of the bottle...
In this picture there is a bottle of cool drink and RISK word is written at the top of the bottle and a posture of the man who is wearing a red shirt and a hat on the bottle.

Urgent: Sophisticated Attack Hits RubyGems, Stealing Bitcoin via Malicious Image Files

Cybersecurity firm Sonatype has uncovered a sophisticated attack on the open-source software supply chain. Malicious code, disguised as harmless image files, has infiltrated the RubyGems repository, affecting hundreds of packages.

The attack, attributed to a developer linked with the Pure malware families, uses steganography to hide Bitcoin-leeching malware within quasi-image (PNG) files. Once executed, the malware replaces a user's Bitcoin address with the attacker's, siphoning funds.

The compromised packages, totalling 700, exploit human typographical errors through a technique called typosquatting. They mimic real-world package names, such as 'atlas-client' instead of 'atlas_client', to bypass scrutiny and gain access to systems. On Windows machines, the malware executes when specific files are renamed to '.exe'.

Sonatype recommends immediate action. Affected packages should be removed, and dependency spellings confirmed before downloading legitimate ones. Compromised hosts must be remediated, as infected systems remain at risk with latent malware that persistently reruns on every reboot.

This attack underscores the importance of vigilance in the open-source software supply chain. Users and developers must remain cautious of potential threats, even in seemingly innocuous files. Sonatype customers were promptly notified and provided with remediation instructions.

Read also:

Latest