LottieFiles confirmed a supply chain attack on Lottie-Player
LottieFiles confirmed a supply chain attack on Lottie-Player, and threat actors targeted cryptocurrency wallets to steal funds.
LottieFiles confirmed that threat actors have hacked the Lottie-Player software in a supply chain attack.
Lottie-Player is a web component from LottieFiles designed to render Lottie animations, which are lightweight, vector-based animations in JSON format. These animations are widely used in web and mobile applications because they are scalable, smooth, and efficient, typically more compact than traditional image or video formats.
Developers can integrate Lottie-Player into their websites or applications to add animations without heavy file sizes, enhancing user experience with interactive visuals.
Several Lottie-Player users reported that their websites began displaying a pop-up, urging visitors to connect their cryptocurrency wallets.
It appears to be a supply chain attack aimed at stealing funds from users that connected their crypto wallets. The attackers took over an employee’s NPM account through a phishing attack and within an hour published the malicious package.
On October 30, 2024, LottieFiles was alerted to unauthorized versions of its widely used open-source npm package, @lottiefiles/lottie-player
. Attackers pushed a malware-laced version of the package to the repository. This supply chain attack affected only the npm web player package and did not impact LottieFiles’ other products, such as the dotlottie player or SaaS services.
“On October 30th ~6:20 PM UTC – LottieFiles were notified that our popular open source npm package for the web player @lottiefiles/lottie-player had unauthorized new versions pushed with malicious code. This does not impact our dotlottie player and/or SaaS services. Our incident response plans were activated as a result. We apologize for this inconvenience and are committed to ensuring safety and security of our users, customers, their end-users, developers, and our employees.” reads the statement “Incident Response for Recently Infected Lottie Web Player versions 2.05, 2.06, 2.07” published on the company forum.
Threat actors exploited a compromised developer access token to publish unauthorized versions 2.0.5, 2.0.6, and 2.0.7 of @lottiefiles/lottie-player
to npm.
The bogus versions included code that prompted users to connect their cryptocurrency wallets. Many users, relying on third-party CDNs and without a pinned version, were automatically served the compromised release. Once a safe version was published, those users automatically received the fix.
The company published a new safe version (2.0.8) of the package and removed all access and associated tokens/services accounts of the impacted developer.
The company quarantined the employee’s laptop while investigating the incident.
The company still investigating the attack with the help of cloud forensics experts.
“Preliminary investigations revealed that LottieFiles open source libraries, code, GitHub repos and SaaS were not impacted, but we continue to perform a full inventory and audit of all systems, credentials and code bases. – We are in the process of implementing immediate measures for a secure and more robust delivery of open source code and will provide updates to the community soon.” reads the update provided by the company. “Our third party incident response and cloud forensics experts are working with us 24×7 to ensure that we continue to enhance our security posture.”
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, LottieFiles)
目录
最新
- Veeam addressed critical Service Provider Console (VSPC) bug
- Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks
- U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog
- The ASA flaw CVE-2014-2120 is being actively exploited in the wild
- DMM Bitcoin halts operations six months after a $300 million cyber heist
- Energy industry contractor ENGlobal Corporation discloses a ransomware attack
- Poland probes Pegasus spyware abuse under the PiS government
- BootKitty Linux UEFI bootkit spotted exploiting LogoFAIL flaws