谷歌 Go 模块镜像提供后门长达 3 年以上

  • 2025 February Incident: Researchers at Socket uncovered a supply chain attack in the Go programming ecosystem. A malicious package named github.com/boltdb-go/bolt impersonated the legitimate BoltDB module and exploited the Go Module Proxy's caching mechanism to persist undetected for years, highlighting module management system vulnerabilities.
  • Go Module Proxy: Designed to cache modules indefinitely for consistent and reliable builds, it offers benefits but also has risks. Once a malicious module is cached, it remains available even if the source repository is changed. In this case, the attacker used this feature to maintain the backdoored package.
  • Broader Trend: Attackers exploit package management systems through techniques like typosquatting. Similar incidents have occurred in other ecosystems like npm and PyPI.
  • Mitigation Measures: Developers should verify package names and sources before installation, conduct regular audits of dependencies, use security tools to flag suspicious packages, and stay updated with known vulnerabilities and ecosystem alerts to enhance software supply chain security and reduce the risk of malicious code.
阅读 9
0 条评论