Tagged articles
2 articles
Page 1 of 1
21CTO
21CTO
Feb 16, 2021 · Information Security

How Hackers Exploit Dependency Confusion to Hijack Packages and Earn Bounties

Security researcher Alex Birsan demonstrates how simple dependency‑confusion attacks—registering private package names on public registries like npm, PyPI, and RubyGems—can silently compromise internal build systems of major tech firms, yielding high‑value bug bounties while exposing systemic risks in package management.

Bug Bountydependency confusionnpm
0 likes · 14 min read
How Hackers Exploit Dependency Confusion to Hijack Packages and Earn Bounties
ITPUB
ITPUB
Feb 15, 2021 · Information Security

How Hackers Exploit Dependency Confusion to Breach Major Tech Companies

This article explains how simple yet powerful dependency‑confusion attacks let attackers upload malicious packages to public registries, exfiltrate data via DNS, and compromise internal systems of companies like PayPal, Shopify, Apple and others, highlighting the methodology, results, root causes and mitigation ideas.

Bug Bountydependency confusionnpm
0 likes · 13 min read
How Hackers Exploit Dependency Confusion to Breach Major Tech Companies