T1195.001Compromise Software Dependencies and Development Tools
98%
“, hoovered up a ton of developers ' secrets, cloud credentials, ssh keys, and kubernetes configuration files, then planted persistent backdoors on developers ' machines. this intrusion also gave the attackers an initial access vector into several other open source tools including…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
97%
“manager. " attackers are deliberately targeting the tools developers are told to trust most : security scanners, password managers, and other high - privilege software wired directly into developer environments. this is why the fallout can get big very quickly, " socket ceo feros…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
90%
“may contain credentials or other sensitive configuration data, " the supply chain security researchers wrote. then it got even worse. the ripple effect in addition to the trojanized kics image, the miscreants compromised additional checkmarx developer tooling including checkmarx …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
81%
“security tooling and vendors, " aboukhadijeh said. " they are explicitly targeting the open source security ecosystem and developer infrastructure. " after initially compromising trivy, litellm, kics, and other open source security tools, teampcp partnered with ransomware and ext…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
75%
“ongoing supply - chain attack ' explicitly targeting ' security, dev tools ongoing supply - chain attack ' explicitly targeting ' security, dev tools vendor confirms repo data exposure after lapsus $ claims source code, secrets dump software security testing outfit checkmarx has …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
61%
“, hoovered up a ton of developers ' secrets, cloud credentials, ssh keys, and kubernetes configuration files, then planted persistent backdoors on developers ' machines. this intrusion also gave the attackers an initial access vector into several other open source tools including…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
57%
“ongoing supply - chain attack ' explicitly targeting ' security, dev tools ongoing supply - chain attack ' explicitly targeting ' security, dev tools vendor confirms repo data exposure after lapsus $ claims source code, secrets dump software security testing outfit checkmarx has …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
49%
“manager. " attackers are deliberately targeting the tools developers are told to trust most : security scanners, password managers, and other high - privilege software wired directly into developer environments. this is why the fallout can get big very quickly, " socket ceo feros…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
45%
“may contain credentials or other sensitive configuration data, " the supply chain security researchers wrote. then it got even worse. the ripple effect in addition to the trojanized kics image, the miscreants compromised additional checkmarx developer tooling including checkmarx …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
41%
“ongoing supply - chain attack ' explicitly targeting ' security, dev tools ongoing supply - chain attack ' explicitly targeting ' security, dev tools vendor confirms repo data exposure after lapsus $ claims source code, secrets dump software security testing outfit checkmarx has …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump
Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have come from one of its GitHub repositories after the Lapsus$ extortion crew claimed to have dumped the company’s source code, secrets, and other sensitive data.…