Skip to content

Commit 1a2574f

Browse files
authored
Make a list look like a list. (#256)
1 parent d9a1d39 commit 1a2574f

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

docs/case_studies.md

+5-4
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,9 @@ It grabbed the data associated with the token from the Discord API and exfiltra
2828

2929
Similar to discordcmd above, this NPM package attempts to steal a Windows user's Discord account token and was discovered by identifying calls to the Discord API. This package:
3030

31-
searches through local browser databases for a token;
32-
queries the Discord server to discover details about the token;and exfiltrates these details to a Discord server controlled by the attacker.
31+
- searches through local browser databases for a token;
32+
- queries the Discord server to discover details about the token;
33+
- and exfiltrates these - details to a Discord server controlled by the attacker.
3334

3435
## Remote Shell
3536

@@ -73,9 +74,9 @@ This package was discovered from the unusual request to the Heroku server.
7374

7475
## Dependency Confusion / Typosquatting
7576

76-
The vast majority of the malicious packages we detected are [dependency confusion](https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610) and [typosquatting](https://en.wikipedia.org/wiki/Typosquatting) attacks.
77+
The vast majority of the malicious packages we detect are [dependency confusion](https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610) and [typosquatting](https://en.wikipedia.org/wiki/Typosquatting) attacks.
7778

78-
The packages we found usually contain a simple script that runs during an install and calls home with a few details about the host. These packages are most likely the work of security researchers looking for bug bounties, since most are not exfiltrating meaningful data except the name of the machine or a username, and they make no attempt to disguise their behavior.
79+
The packages found usually contain a simple script that runs during install and calls home with a few details about the host. These packages are most likely the work of security researchers looking for bug bounties, since most are not exfiltrating meaningful data except the name of the machine or a username, and they make no attempt to disguise their behavior.
7980

8081
These dependency confusion attacks were discovered through the domains they used, such as burpcollaborator.net, pipedream.com, interact.sh, which are commonly used for reporting back attacks. The same domains appear across unrelated packages and have no apparent connection to the packages themselves. Many packages also used unusual version numbers that were high (e.g. v5.0.0, v99.10.9) for a package with no previous versions.
8182

0 commit comments

Comments
 (0)