Key points:
- Threat actors are using aliases to publish malicious gems that mimic legitimate Fastlane plugins.
- The attack redirects Telegram API traffic to an actor-controlled C2 server, exfiltrating sensitive data.
- The timing of the attack coincides with Vietnam's ban on Telegram, suggesting a targeted approach.
- Security experts warn of the broader implications of such supply chain vulnerabilities.
- Recommendations include verifying the legitimacy of Telegram proxies and being cautious of typosquatting.
Sources:
CSO Online
(1 articles)