Skip to content

John Deere Hit by Malicious npm Packages in Supply Chain Attack

John Deere's private dependencies were targeted by 17 malicious npm packages. This incident underscores the importance of robust dependency management in software supply chains.

2 deers are present on the grass.
2 deers are present on the grass.

John Deere Hit by Malicious npm Packages in Supply Chain Attack

A security alert has been raised involving John Deere, a prominent U.S. agricultural equipment manufacturer. Sonatype's automated malware detection technology has identified 17 malicious npm packages targeting the company's private dependencies.

The discovery was made by Sonatype's Repository Firewall, which uses automated bots to safeguard software supply chains. The malicious packages were designed to execute simple commands like 'whoami' and 'hostname', potentially enabling unauthorized access to systems.

The ethical hacker behind these packages has been identified as Shaikh Yaser. He confirmed publishing the packages for ethical security research, a practice known as dependency confusion. This technique exploits the fact that many organizations use private dependencies that are also available publicly, allowing attackers to replace legitimate packages with malicious ones.

Sonatype promptly notified both John Deere and npm about the issue. At least 12 of the malicious packages directly targeted John Deere's private dependencies. Sonatype Repository Firewall has been blocking these packages from reaching development builds, ensuring no harm was done.

This incident serves as a reminder of the potential security risks in software supply chains. John Deere, along with other organizations, should review their dependency management practices to mitigate such risks. Sonatype's automated malware detection technology continues to play a crucial role in protecting software supply chains from infections.

Read also:

Latest