Do you know what questions to ask when you're looking for an IT firm? We're here to help. Get the free guide delivered right to your inbox:
A supply-chain attack against the Rust development community in 2022 has been uncovered by SentinelLabs and could lead to larger scale attacks, writes Juan Andrés Guerrero-Saade and Phil Stokes. Guerrero-Saade is a security researcher and CEO of SentinelLabs while Stokes is the CTO of the cybersecurity firm.
They write, "To protect ourselves against this overwhelming threat, we guarantee that our research will be publicly available which will allow anyone to make their own decisions on how to proceed. We are confident that other researchers in the field will make similar analyses."
This blog offers insight into an attack against Rust developers by estimating how many records have been affected as well as what kind of information has been leaked out. The attack was not effectively stopped because the Rust community took long to respond. We believe that this article, with this first analysis, will serve as a warning and a wake-up call for the Rust community as a whole.
The Rust developers are facing a supply-chain attack because of their dependency on the internet of things (IoT). The IoT is known to have vulnerabilities and has been said to be insecure. However, the Rust developers knew about this risk and decided to not remove the IoT dependencies. By using their IoT code as a backdoor, cybercriminals might gain access to their systems. The attack affects both the developer and the user; that is what most security experts call an omnipotent attack.
The announcement of OpenSSL vulnerabilities can be seen as a wake-up call to the Rust community. The Rust community was doing well and making progress until they faced an extreme supply-chain attack.