Two Rubygems Infected With Crypto-Stealing Feature Malware Spotted by Researchers – Security Bitcoin News


Two Rubygems Infected With Crypto-Stealing Feature Malware Spotted by Researchers

New infected Rubygems packages have been spotted in its open-source software repository and which contained malicious code mainly used to steal cryptocurrencies from users via supply chain attack.

Two Cryptocurrency-Stealers Rubygems Detected by Researchers at Sonatype

According to Ax Sharma, a security researcher at Sonatype, the two gems detected — pretty_color and ruby-bitcoin — had malware that deployed the attack on Windows machines and replaced any bitcoin (BTC), ethereum (ETH), or monero (XMR) wallet addresses found on the victim’s clipboard by the attackers’ ones.

Rubygems is a package manager for the Ruby programming language that allows developers to integrate code developed by other people. Anyone can upload a “gem” to the repository, open in some way the doors for threat actors to upload their malicious packages.

The researcher explained further about how the attack operates:

This means if a user who had mistakenly installed either of these gems was to copy-paste a bitcoin recipient wallet address somewhere on their system, the address would be replaced with that of the attacker, who’d now receive the bitcoins.

During an analysis conducted by the Sonatype Security Research team, it was detected that unless the victim double-checks the wallet address after they paste it, the clipboard hijacker deployed during the supply chain attack will quietly change the address by creating separate malicious scripts contained in VBS files.

Supply Chain Attacks: A Growing Concern

Sharma also warned on the growing trend that supply chain attacks have so far in 2020, considering it a “bigger concern.”

According to Sonatype’s 2020 State of the Software Supply Chain report, there was a 430% increase in upstream software supply chain attacks over the past year, making it “virtually impossible” to chase and keep track of such components manually.

Sonatype’s Sharma adds:

Of all activities a ransomware group may conduct on a compromised system, replacing bitcoin wallet address on the clipboard feels more akin to a trivial mischief by an amateur threat actor than to a sophisticated ransomware operation. However, this coincidence does raise a bigger concern, considering how rampant software supply chain attacks have been in 2020.

Tags in this story
crypto wallet, Cryptocurrency Security, cryptocurrency wallet, cybersecurity, hijack, Protection, Security, security analysis, security breach, Supply Chain, wallet address

Will we see a leading role in crypto-related supply chain attacks in 2021? Let us know in the comments section below.

Felipe Erazo

Born in Colombia, Felipe earned a degree in journalism at the University of Chile with the highest honor in the overall ranking and holds a Bachelor of Arts in Social Communication. He is a writer with more than nine years of experience, first in the Forex field and later in the crypto industry as an analyst/news junkie. Among his interest topics include human rights, decentralization, financial markets, geopolitics, sports, and new technologies. An inveterate traveler, and always attracted to a good plate of food.

Image Credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Read disclaimer
Show comments