Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
The Military Security

Defense Department Reportedly Relies On Utility Written by Russian Dev (theregister.com) 58

A widely used Node.js utility called fast-glob, relied on by thousands of projectsâ"including over 30 U.S. Department of Defense systems -- is maintained solely by a Russian developer linked to Yandex. While there's no evidence of malicious activity, cybersecurity experts warn that the lack of oversight in such critical open-source projects leaves them vulnerable to potential exploitation by state-backed actors. The Register reports: US cybersecurity firm Hunted Labs reported the revelations on Wednesday. The utility in question is fast-glob, which is used to find files and folders that match specific patterns. Its maintainer goes by the handle "mrmlnc", and the Github profile associated with that handle identifies its owner as a Yandex developer named Denis Malinochkin living in a suburb of Moscow. A website associated with that handle also identifies its owner as the same person, as Hunted Labs pointed out.

Hunted Labs told us that it didn't speak to Malinochkin prior to publication of its report today, and that it found no ties between him and any threat actor. According to Hunted Labs, fast-glob is downloaded more than 79 million times a week and is currently used by more than 5,000 public projects in addition to the DoD systems and Node.js container images that include it. That's not to mention private projects that might use it, meaning that the actual number of at-risk projects could be far greater.

While fast-glob has no known CVEs, the utility has deep access to systems that use it, potentially giving Russia a number of attack vectors to exploit. Fast-glob could attack filesystems directly to expose and steal info, launch a DoS or glob-injection attack, include a kill switch to stop downstream software from functioning properly, or inject additional malware, a list Hunted Labs said is hardly exhaustive. [...] Hunted Labs cofounder Haden Smith told The Register that the ties are cause for concern. "Every piece of code written by Russians isn't automatically suspect, but popular packages with no external oversight are ripe for the taking by state or state-backed actors looking to further their aims," Smith told us in an email. "As a whole, the open source community should be paying more attention to this risk and mitigating it." [...]

Hunted Labs said that the simplest solution for the thousands of projects using fast-glob would be for Malinochkin to add additional maintainers and enhance project oversight, as the only other alternative would be for anyone using it to find a suitable replacement. "Open source software doesn't need a CVE to be dangerous," Hunted Labs said of the matter. "It only needs access, obscurity, and complacency," something we've noted before is an ongoing problem for open source projects. This serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does," Hunted Labs concluded.

This discussion has been archived. No new comments can be posted.

Defense Department Reportedly Relies On Utility Written by Russian Dev

Comments Filter:
  • just npm-fund with trumps CC card!

  • by KiloByte ( 825081 ) on Wednesday August 27, 2025 @07:00PM (#65620250)

    A named person with a verifiable location and employment is less likely to turn malicious than an unnamed (ie, fake named) one. And, devs who intend to plant a time/logic bomb (in a sanely distributed piece of software) or a simple rug pull (in node.js or docker) will use a proxy in a less suspect part of the world.

    Heck, I myself offered a bunch of Cuban guys at a conference a VPN they could use for Github (which bans Cuba as an "evil" country); in the end, they went with someone else who has better ping to Cuba. So here goes the idea of banning devs based on their country...

    Thus, you'd need to accept named Russians and ban everyone else, from any country other than Russia (as they might use a proxy). Oops...

    • There's certainly hostile intent somewhere to be found, you cannot expect to be in a war without the enemy shooting back.

      TFA and the likes however, are nothing but porgroms, and they are a way to make more, not less enemies.

    • by ogl_codemonkey ( 706920 ) on Thursday August 28, 2025 @07:30AM (#65621094)

      GitHub don't "ban Cuba" - Cuba is embargoed by US government sanctions.

      I don't care what you do, but probably good to at least be aware of the crime you offered to commit for a bunch of guys at a conference.

  • Paranoid (Score:5, Insightful)

    by AmiMoJo ( 196126 ) on Wednesday August 27, 2025 @07:01PM (#65620252) Homepage Journal

    Their issue is really that there is little to no security with these packages. The code is fine now, but just like every other package it could be altered. The only novel thing is that he's Russian.

    I somehow doubt he will be interested in adding more developers to make them happy. Someone could fork it, but that doesn't solve any security issues. Just not being Russian doesn't mean anything really.

    • Just not being Russian doesn't mean anything really.

      By the same token, just being Russian doesn't mean anything really.

      • Re:Paranoid (Score:4, Insightful)

        by kertaamo ( 16100 ) on Thursday August 28, 2025 @04:36AM (#65620948)

        When your country is invading a neighbour intent on genocide and endlessly threatens Europe and other places then I claim that being Russian means a heck of a lot.

        But you are right, in terms of security for this package and all the other thousands of packages in such similar repositories it really does not matter if the author is Russian or some malcontent in a basement in California.

        • Only if you assume every citizen of that country wholeheartedly supports the actions of their government.

          The only places where that has ever been true have been the "sovereign nations" that amount to a redneck's shack with barbed wire and a load of misspelled signs around it, and even then they probably have moments where they privately wonder if their government might be insane.

    • 7zip is another program that might be at risk.

      Think about an offer you can't refuse.

    • Re:Paranoid (Score:4, Insightful)

      by Local ID10T ( 790134 ) <ID10T.L.USER@gmail.com> on Wednesday August 27, 2025 @07:13PM (#65620280) Homepage

      Their issue is really that there is little to no security with these packages. The code is fine now, but just like every other package it could be altered.

      For anything where security is a consideration, you should always vet included 3rd party code, and maintain an internal "known good" repository to draw from.

      Yes, this means you have to update (and re-verify) code in your internal repository regularly to avoid discovered flaws. Modern tools like GIT make this a lot easier than it used to be. It still takes effort and diligence.

      It is just part of the cost of security. You can choose not to be secure. Or you can do the work.

      • by cusco ( 717999 )

        his means you have to update (and re-verify) code in your internal repository regularly

        It's the Pentagon, where people still encounter servers with the admin password being something trivial as P@ssw0rd1

        • Sounds like things have changed quite a bit since I was stationed there (86-89).

          I was a programmer on a main frame with top secret data. The user names we were issued were convoluted enough to make half way decent passwords and the passwords were even better. Certainly nothing so bad as your example.

          Memorizing both took me a while and, of course, we couldn't keep a copy of our credentials anywhere but inside the SCIF. And even then they were kept in a sealed (&initialed) envelope that was kept inside

          • by cusco ( 717999 )

            There definitely was a change then with the flood of client/server systems. When I was still a PC/Server Tech (so some time between 1998 and 2006) the Pentagram audited their servers and found that about ten percent of them had an Administrator password of Password.

      • And nearly everyone will choose to not do the work because verifying third party code is a lot of work. This is particularly true with NodeJS where each component gets its own copies of dependencies (instead of having shared dependencies which is usually true in most other environments) and you can have literally thousands of dependencies for a single app.

    • >> Someone could fork it, but that doesn't solve any security issues.

      Someone could fork it and be less likely to decide (or be forcibly persuaded) to inject some subtle vulnerabilities in the future.

    • by sodul ( 833177 )

      Yes, unfortunately while the issue is more prominent with NodeJS packages, it is inherently pretty bad all around, including with Python and Go.

      For Go there was a recent ssh hacking package that was phoning the results home, so if you tried to test your own infrastructure you would gracefully share the results with hackers. Google does provide a global go mod proxy which should help filter some of the bad packages but I doubt they are capable of validating every single source, especially since most Go modul

    • Re:Paranoid (Score:4, Insightful)

      by Mondragon ( 3537 ) on Wednesday August 27, 2025 @10:23PM (#65620590)

      Articles like this are why The Register is a joke amongst professionals in the field. This is a company using the media to create a PR stunt to drive business, and they are content to be complicit. ALL packages that you don't audit are to be untrusted - it doesn't matter _where_ they come from. Developers in the US and UK can easily be pressed to make code injections under existing national security laws. It doesn't matter _where_ code comes from, it matters if you're stupid enough to run it without auditing it yourself. The argument of Hunterlabs to claim that it matters where your code comes from is jingoistic and incredibly offensive - no one should ever work with these people.

      • by gtall ( 79522 )

        From The Register article:

        "This serves as another powerful reminder that knowing who writes your code is just as critical as understanding what the code does," Hunted Labs concluded.

        So you are typing out of your ass.

        • by kertaamo ( 16100 )

          But that is nonsense. What the code actually does is what makes it secure or not. Knowing who wrote the code tells you nothing about what the code actually does. It just makes you feel better and lazy. That leads to less rigorous examination of the code you are using, which opens thousands of holes for those with bad intentions.

    • US Government entity with budgets counted in billions currently depends on unpaid work of a single guy. The code is open and free. They could invest some $$$ into forking it and taking ownership of its maintenance. It is widely beleived they probably wouldn't notice financial impact even if it was few millions per year. I'd like to know what are the reasons they haven't done it already.
  • Until now. Now the threat actors are aware of this vulnerability, I'm sure they're looking closely at this guy.

  • Entitled much? (Score:5, Insightful)

    by fuzzyfuzzyfungus ( 1223518 ) on Wednesday August 27, 2025 @07:29PM (#65620316) Journal
    "As a whole, the open source community should be paying more attention to this risk and mitigating it."

    So, if I'm understanding this right, the solution is for more people to work for free so I can just blindly grab whatever; not for the people already getting their software for nothing to care even slightly about their dependencies?
    • not for the people already getting their software for nothing to care even slightly about their dependencies?

      The Defense Department, or any other Org-T that you consider trustworthy, could review and certify open source software that they use and also make their certifications public for others to rely upon.

      Instead of specifying a specific version of project X, I could specify the latest version of X that is certified by Org-T, or I could specify the latest version of Org-T's fork of X.

      • I think it's the very fact that you can(and probably should; at least to some degree) do more or less exactly that is what makes this report seem so hysterical.

        It's not like it's false that some Yandex software dude will probably cooperate if the FSB tap him on the shoulder and suggest that it's exciting and mandatory; while John Smith, corn-fed American patriot, is at least going to require some sweet-talking; but if you are just blindly grabbing 'package that some dude put on NPM' your problems are far
  • So, how's that whole connect the world via the internet and hope people get over their differences thing been working out?

  • Mistakes were made (Score:4, Insightful)

    by skogs ( 628589 ) on Wednesday August 27, 2025 @08:38PM (#65620436) Journal

    I am fully aware of the limitations that made node.js seem like a good idea.

    I will get down voted hard, but the problems occured when somebody decided that they wanted to run javascript for a core piece of software. The fact other people piled onto it just compounded the problem.

    If you need a thing - you write the software for it. Javascript is probably 30 years old now, but it is still a bad decision.

    It is exactly equal to all things container. Sure the idea of a discrete blob that isolates a thing is great...but this is not how anybody is using it. The number of nooblets building environments with hundreds of containers orchestrated to do a certain task is startling. Nooblets that don't have any idea how to actually set up or run a server, multiplying bad practices by the hundreds.

    • Re: (Score:3, Insightful)

      Every time I have the displeasure of seeing a project with hundreds (literally) of javascript dependencies where you don't have the slightest chance to check whether each of them is safe to use in a timely manner, I completely agree with you.
    • I wish I had a mod point.

    • by kertaamo ( 16100 )

      "If you need a thing - you write the software for it. Javascript is probably 30 years old now, but it is still a bad decision."

      I do like that idea. But realistically nobody has the time or money or skill or knowledge to create everything they use. From the boot loader of your machine to the operating system, to the compilers you use and the libraries you depend on. Having everybody recreate the wheel would be a massively inefficient process and likely bankrupt the world's economy if everyone was intent on d

  • The actual simplest solution is not for this maintainer to take on additional maintainers and "oversight". The simplest solution is for him to ignore all this and continue maintaining his project however he sees fit. People who release software as open source do not suddenly gain an obligation to mitigate perceived risks or follow corporate policies from their downstream users. This is just another iteration of managers yelling at open source volunteers for not responding to their bug reports in the way

  • by Mondragon ( 3537 ) on Wednesday August 27, 2025 @10:12PM (#65620576)

    They "discovered" a fact which was public on github for 5 years. If they were actually interested in cybersecurity they'd be sounding the alarm about the lack of trust of packages in general (obviously projects with tens of maintainers have never had security issues from within.......). This is a PR stunt by a firm that has little expertise and a lot of political pull (management of Mark Esper, among others). All they're doing is using the media to gin up business that they're obviously very bad at.

  • These are all issues that have been hashed and rehashed for decades. These guys are just ginning up free PR hoping to get some name recognition and business.

  • A quick look at NPM shows fast-glob has 8173 dependents, and 5 dependencies. A change to micromatch might break 8174 packages.

    Or, do it right.

  • by Bu11etmagnet ( 1071376 ) on Thursday August 28, 2025 @01:55AM (#65620824)

    So https://xkcd.com/2347/ [xkcd.com] was wrong; it's not a random guy in Nebraska, it's a random guy in a suburb of Moscow.

  • by fuzzyfuzzyfungus ( 1223518 ) on Thursday August 28, 2025 @06:28AM (#65621020) Journal
    "Request a demo of Entercept, the first and only platform designed to identify and track foreign influence in your software."

    I do love a good disinterested vendor writeup...
  • On the positive side: It's open source, it is easy to see what has changed when, and to monitor the repository for malicious changes. So this is a nothing-burger.

    On the negative side, WTF is anyone, least of all the DoD, doing with node.js and JavaScript on the server? Seriously?

  • Absolute joke (Score:3, Insightful)

    by IDemand2HaveSumBooze ( 9493913 ) on Thursday August 28, 2025 @09:51AM (#65621326)

    So a developer writes an open source utility which is apparently very useful judging by the fact that it's used in Node.js and all these projects, and it's completely free. That's great, right? Everybody wins. But, no, he happens to live in a country which US doesn't like very much, and the utility happens to be used by US military, so that means he could do something nefarious. The guy never asked for US military to use his work, it has nothing whatsoever to do with anything military related, being a file search regex as far as I understand. Also this is open source project, so you can actually look at all the source code and see for yourself if there is anything malicious there. Which is exactly what a 'cybersecurity firm' should be doing, instead of doxxing open source developers. Except maybe they don't have anyone who can understand source code.

    But the icing on the cake is

    Hunted Labs said that the simplest solution for the thousands of projects using fast-glob would be for Malinochkin to add additional maintainers and enhance project oversight

    So you write some software, once again, for free, someone with no relationship to you takes your work and uses it, at the risk of sounding repetitive, for free, and then starts demanding that you spend your own money to hire more people (who must presumably all not be Russian) to calm their paranoia that you might do something bad in future. Wow, just wow. Although to be fair this nonsense doesn't come from US DoD but from this complete joke of a 'cybersecurity firm'.

    If you start demanding that open source developers pass security clearance (potentially for every military in the world), produce extensive documentation to satisfy whatever compliance standards someone demands etc etc then what's going to happen is people will go 'Fuck this, I have better things to do with my free time'. And then no more open source. And we're back to the old days of everyone doing their own shitty homebrew implementation of every bit of low-level functionality. If DoD wants to write their own implementation of Javascript written entirely by totally security-vetted developers they're welcome to pay contractors however many millions that would require to do exactly that. But it looks like they're actually smart enough to understand that open-source code is pretty secure just by virtue of being used in so many places and being looked at by so many different eyes. It's just this so-called 'cybersecurity firm' trying to get some free publicity by pissing in the well. Ingrates like this just really annoy me.

    • Yep, its a good idea to double check work (our own and others). People with their accusations might be sending the wrong message. Maybe this guy doesn't know what else to do to help this world, but he's good at that. Put ourselves in that guy's shoes. Maybe he's giving it his all, trying to save the world with his small contribution, but gets mostly flak. From Mission Impossible; Denlinger: "So let me get this straight: When there's a mission none of you can handle, you just "leave word" for a nameless man,
    • demanding that you spend your own money to hire more people (who must presumably all not be Russian) to calm their paranoia

      Well, it says in the summary that "there's no evidence of malicious activity", and Hunted Labs have a long list of things this could potentially be used for.

      Since Malinochkin himself doesn't seem to have any interest in exploiting this potential, he will have to hire someone who is more amenable. It is open source, yes, but forking fast-glob is not going to help with injecting bugs.

  • would be him to tell you for you merkins to spend some of that military pork barrel budget and code your own, its your problem not his,
  • Don't tell them about DevExpress and its can of worms
  • They could Fork it to an Private GitHub repo. If it's open source. Then they could control what's in it.
  • I would hope the DOD has processes in place to verify the security of all of the software they're using. If not, I think there are some more areas of concern than relying on a Russian's work.

  • They have three choices: Trust the guy and continue using his code. Good luck. Or donâ(TM)t trust the guy, and everyone replaces his package with some other code. If you trust it. Good luck. Or donâ(TM)t trust the guy, and hire three or four guys who are trustworthy, competent and willing to comb through his code looking for bugs or backdoors. The only problem is finding the guys, and finding the money to pay them. That could be a winning move and lead to better code.
    • If they don't trust him, they can just pull a local copy and use that.
      Or at least pin the last known good version.

      They don't need to trust him to use his code.

      But they do need him if they want his package to infect other systems.

  • common, and has HQ in Bulgaria, a Russian-friendly nation. Should Radzen users be similarly concerned?

Do you suffer painful elimination? -- Don Knuth, "Structured Programming with Gotos"

Working...