This month, the developer at the rear of the popular npm package ‘node-ipc’ released sabotaged variations of the library in protest of the ongoing Russo-Ukrainian War.
Newer versions of the ‘node-ipc’ package began deleting all info and overwriting all documents on developer’s devices, in addition to creating new text files with “peace” messages.
With over a million weekly downloads, ‘node-ipc’ is a outstanding package applied by key libraries like Vue.js CLI.
Protestware: Ukraine’s ongoing disaster bleeds into open resource
Select variations (10.1.1 and 10.1.2) of the massively popular ‘node-ipc’ offer were being caught containing destructive code that would overwrite or delete arbitrary documents on a method for consumers dependent in Russia and Belarus. These variations are tracked less than CVE-2022-23812.
The offers appear to have been originally designed by the developer as a suggests of peaceful protest, as they mainly add a “concept of peace” on the Desktop of any consumer installing the offers.
“This code serves as a non-harmful illustration of why managing your node modules is important,” explains RIAEvangelist.
“It also serves as a non-violent protest versus Russia’s aggression that threatens the environment proper now.”
But, chaos unfolded when pick out npm versions of the well-known ‘node-ipc’ library—also managed by RIAEvangelist, have been seen launching a destructive payload to delete all data by overwriting files of consumers setting up the bundle.
Interestingly, the malicious code, committed as early as March 7th by the dev, would go through the system’s external IP tackle and only delete details by overwriting information for customers based mostly in Russia and Belarus.
The code present inside ‘node-ipc’, especially in file “ssl-geospec.js” contains base64-encoded strings and obfuscation ways to mask its accurate objective:
A simplified duplicate of the code offered by researchers exhibits that for consumers dependent in Russia or Belarus, the code will rewrite the contents of all documents existing on a procedure with a heart emoji—effectively deleting all info on a method.
In addition, because ‘node-ipc’ versions 9.2.2, 11.., and all those bigger than 11..0 bundle the peacenotwar module inside of on their own, influenced buyers saw ‘WITH-Appreciate-FROM-America.txt’ documents popping up on their Desktop with “peace” messages:
Researchers at open supply safety company Snyk also tracked and analyzed the destructive exercise:
“At this stage, a very clear abuse and a essential provide chain protection incident will take place for any procedure on which this npm package will be known as upon, if that matches a geo-place of either Russia or Belarus,” writes Liran Tal, Director of Developer Advocacy at Snyk in a website publish.
Vue.js people worry more than source chain assault