CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Compromise of Ruby gems and Go modules via poisoned packages leads to credential theft and CI pipeline manipulation

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A coordinated software supply chain attack leveraged sleeper packages in RubyGems and Go modules to deploy malicious payloads targeting CI pipelines, enabling credential theft, GitHub Actions tampering, and SSH persistence. The attack originated from the GitHub account "BufferZoneCorp", which published repositories and packages disguised as legitimate libraries such as activesupport-logger and go-retryablehttp. The malicious packages were designed to harvest environment variables, SSH keys, AWS secrets, and developer credentials, exfiltrating data to attacker-controlled endpoints. Go modules also contained functionality to manipulate GitHub Actions workflows, inject fake Go wrappers, and add persistent SSH access via authorized_keys. As of reporting, all identified packages have been yanked or blocked.

Timeline

  1. 01.05.2026 12:43 1 articles · 1h ago

    Poisoned Ruby gems and Go modules linked to credential theft and SSH persistence in CI pipelines

    Malicious packages published under "BufferZoneCorp" on GitHub were distributed via RubyGems and Go modules, including sleeper packages, to harvest credentials and manipulate CI workflows. Ruby gems targeted credential theft during installation, while Go modules injected fake Go wrappers to intercept build steps and establish SSH persistence. Packages have been removed from distribution channels following discovery.

    Show sources

Information Snippets

  • Attacker-controlled GitHub account "BufferZoneCorp" published malicious Ruby gems and Go modules, including sleeper packages, across RubyGems and Go ecosystems.

    First reported: 01.05.2026 12:43
    1 source, 1 article
    Show sources
  • Malicious Ruby gems were designed to steal environment variables, SSH keys, AWS secrets, .npmrc, .netrc, GitHub CLI configuration, and RubyGems credentials during installation, exfiltrating data to a Webhook.site endpoint.

    First reported: 01.05.2026 12:43
    1 source, 1 article
    Show sources
  • Go modules included functionality to tamper with GitHub Actions workflows, inject fake Go wrappers that intercept subsequent Go executions while maintaining legitimate binary operation, steal developer data, and add hard-coded SSH public keys to ~/.ssh/authorized_keys for remote persistence.

    First reported: 01.05.2026 12:43
    1 source, 1 article
    Show sources
  • The Go module payloads detected environment variables GITHUB_ENV and GITHUB_PATH, set HTTP_PROXY and HTTPS_PROXY, and appended a fake Go binary cache directory to the workflow PATH to hijack execution flow.

    First reported: 01.05.2026 12:43
    1 source, 1 article
    Show sources
  • Affected packages have been yanked from RubyGems and blocked in the Go module ecosystem as of the report date.

    First reported: 01.05.2026 12:43
    1 source, 1 article
    Show sources