StepSecurity转发了
StepSecurity Harden-Runner detected a supply chain attack on Microsoft's Azure Karpenter Provider in real-time! ???? On August 31, 2024, an independent security researcher demonstrated a supply chain attack on Microsoft’s open-source project, Azure Karpenter Provider. If carried out by a threat actor, this could have caused a Codecov-style software supply chain attack. An adversary could have exfiltrated CI/CD secrets to access the cloud environments that this workflow had access to. ??? All GitHub Actions workflows in the Azure Karpenter Provider project had been using StepSecurity’s Harden-Runner since January 2024. Harden-Runner had created a baseline of outbound network calls for the impacted job over hundreds of runs. When the researcher exploited the vulnerability to exfiltrate a secret, the outbound call was to a domain that wasn’t in the baseline, triggering Harden-Runner’s anomaly detection alert in real time. ?? Within an hour of the exploit, StepSecurity reported the detection to the Microsoft Security Response Center (MSRC). We are honored to be acknowledged for our detection on Microsoft’s acknowledgment portal, which recognizes contributors to the security of their online services. ?? Following this exploit, the repository now uses Harden-Runner in block mode, actively preventing unauthorized outbound calls that aren’t in the allowed list, further raising the bar for the project’s CI/CD security. ?? This marks the second CI/CD supply chain attack detected by Harden-Runner this year, the previous one being on Google's open-source project, Flank. ?? ?? Check out the video and full case study to learn more about the vulnerability, how it was exploited, and how the exploit was detected in real time. The link to the case study is in the comments.