Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
    Cybersecurity

    Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

    adminBy adminMay 1, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMay 01, 2026Supply Chain Attack / Malware

    A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that enabled credential theft, GitHub Actions tampering, and SSH persistence.

    The activity has been attributed to the GitHub account “BufferZoneCorp,” which has published a set of repositories that are associated with malicious Ruby gems and Go modules. As of writing, the packages have been yanked from RubyGems, and the Go modules have been blocked. The names of the libraries are listed below –

    • Ruby:
      • knot-activesupport-logger
      • knot-devise-jwt-helper
      • knot-rack-session-store
      • knot-rails-assets-pipeline
      • knot-rspec-formatter-json
      • knot-date-utils-rb (Sleeper gem)
      • knot-simple-formatter (Sleeper gem)
    • Go:
      • github[.]com/BufferZoneCorp/go-metrics-sdk
      • github[.]com/BufferZoneCorp/go-weather-sdk
      • github[.]com/BufferZoneCorp/go-retryablehttp
      • github[.]com/BufferZoneCorp/go-stdlib-ext
      • github[.]com/BufferZoneCorp/grpc-client
      • github[.]com/BufferZoneCorp/net-helper
      • github[.]com/BufferZoneCorp/config-loader
      • github[.]com/BufferZoneCorp/log-core (Sleeper module)
      • github[.]com/BufferZoneCorp/go-envconfig (Sleeper module)

    The identified packages masquerade as recognizable and well-known modules like activesupport-logger, devise-jwt, go-retryablehttp, grpc-client, and config-loader so as to evade detection and trick users into downloading them.

    “The account is part of a software supply chain campaign targeting developers, CI runners, and build environments across two ecosystems,” Socket security researcher Kirill Boychenko said in an analysis published today.

    The Ruby gems are designed to automate credential theft during install time, harvesting environment variables, SSH keys, AWS secrets, .npmrc, .netrc, GitHub CLI configuration, and RubyGems credentials. The stolen data is then exfiltrated to an attacker-controlled Webhook[.]site endpoint.

    On the other hand, the Go modules harbor broader capabilities to tamper with GitHub Actions workflows, plant fake Go wrappers, steal developer data, and add a hard-coded SSH public key to “~/.ssh/authorized_keys” for remote access to the compromised host. The modules do not all have the same payload; instead, they are spread across the cluster.

    “The module executes through init(), detects GITHUB_ENV and GITHUB_PATH, sets HTTP_PROXY and HTTPS_PROXY, writes a fake go executable into a cache directory, and appends that directory to the workflow path so the wrapper is selected before the real binary,” Boychenko explained.

    “That wrapper can then intercept or influence later go executions while still passing control to the legitimate binary to avoid breaking the job.”

    Users who have installed the packages are advised to remove them from their systems, review for signs of access to sensitive files or unauthorized changes to “~/.ssh/authorized_keys,” rotate exposed credentials, and inspect network logs for outbound HTTPS traffic to the exfiltration point.

    credential exploit gems Modules pipelines poisoned Ruby theft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYour new 2026 search strategy
    admin
    • Website

    Related Posts

    Open-source privacy proxy masks PII before prompts reach external AI services

    May 1, 2026

    US ransomware negotiators get 4 years in prison over BlackCat attacks

    May 1, 2026

    1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

    May 1, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

    May 1, 2026

    Your new 2026 search strategy

    May 1, 2026

    Open-source privacy proxy masks PII before prompts reach external AI services

    May 1, 2026

    US ransomware negotiators get 4 years in prison over BlackCat attacks

    May 1, 2026
    Categories
    • Blogging (71)
    • Cybersecurity (1,617)
    • Privacy & Online Earning (193)
    • SEO & Digital Marketing (999)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (258)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

    May 1, 2026

    Your new 2026 search strategy

    May 1, 2026

    Open-source privacy proxy masks PII before prompts reach external AI services

    May 1, 2026
    Most Popular
    • Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft
    • Your new 2026 search strategy
    • Open-source privacy proxy masks PII before prompts reach external AI services
    • US ransomware negotiators get 4 years in prison over BlackCat attacks
    • How To Remove Negative Reviews That AI Overviews Cites
    • 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom
    • Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug
    • Google Preferred Sources now works for all languages
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.