Original Article Text

Click to Toggle View

60 malicious Ruby gems downloaded 275,000 times steal credentials. Sixty malicious Ruby gems containing credential-stealing code have been downloaded over 275,000 times since March 2023, targeting developer accounts. The malicious Ruby gems were discovered by Socket, which reports they targeted primarily South Korean users of automation tools for Instagram, TikTok, Twitter/X, Telegram, Naver, WordPress, and Kakao. RubyGems is the official package manager for the Ruby programming language, enabling the distribution, installation, and management of Ruby libraries, known as gems, much like npm for JavaScript or PyPI for Python. The malicious gems in this campaign were published onto RubyGems.org under various aliases over the years. The offending publishers are zon, nowon, kwonsoonje, and soonje, spreading the activity over multiple accounts to make the activity harder to trace and block. The full list of the malicious packages can be found in Socket's report, but below are some notable cases of deceptively named or typosquatted packages: All 60 gems highlighted in the Socket report present a graphical user interface (GUI) that appears legitimate, as well as the advertised functionality. In practice, however, they act as phishing tools that exfiltrate the credentials users enter on the login form to the attackers on a hardcoded command-and-control (C2) address (programzon[.]com, appspace[.]kr, marketingduo[.]co[.]kr). The harvested data includes usernames and passwords in plaintext, device MAC addresses for fingerprinting, and the package name for campaign performance tracking. In some cases, the tools respond with a fake success or failure message, although no real login or API call to the actual service is made. Socket has found credential logs on Russian-speaking darknet markets that appear to derive from these gems, based on interactions with marketingduo[.]co[.]kr, a dubious marketing tool site tied to the attacker. The researchers say that at least 16 of the 60 malicious Ruby gems remain available, although they have reported them all to the RubyGems team upon discovery. Supply chain attacks on RubyGems aren't unprecedented, and they have been going on for several years now. In June, Socket reported another case of malicious Ruby gems that typosquatted Fastlane, a legitimate open-source plugin that serves as an automation tool for mobile app developers, targeting Telegram bot developers specifically. Developers should scrutinize libraries they source from open-source repositories for signs of suspicious code like obfuscated parts, consider the publisher's reputation and release history, and lock dependencies to 'known to be safe' versions. Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Malicious Ruby Gems Compromise Developer Credentials in Supply Chain Attack

Over 275,000 downloads of 60 malicious Ruby gems have been identified since March 2023, targeting developer accounts primarily in South Korea.

The gems, discovered by Socket, impersonate legitimate packages on RubyGems.org, the official Ruby package manager, complicating detection and removal efforts.

Attackers used aliases such as zon, nowon, kwonsoonje, and soonje to distribute the malicious gems, making traceability and blocking more difficult.

These gems present legitimate-looking GUIs but act as phishing tools, exfiltrating credentials to hardcoded command-and-control servers.

Harvested data includes plaintext usernames and passwords, device MAC addresses, and package names, aiding in campaign performance tracking.

Some credential logs have been found on Russian-speaking darknet markets, linked to interactions with a dubious marketing tool site.

Despite reports to the RubyGems team, at least 16 malicious gems remain available, highlighting ongoing challenges in securing open-source supply chains.

Developers are advised to scrutinize open-source libraries for suspicious code, verify publisher reputations, and lock dependencies to secure versions.