{"id":45832,"date":"2022-03-22T15:03:10","date_gmt":"2022-03-22T15:03:10","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33240\/Corrupted-Open-Source-Software-Enters-The-Russian-Battlefield.html"},"modified":"2022-03-22T15:03:10","modified_gmt":"2022-03-22T15:03:10","slug":"corrupted-open-source-software-enters-the-russian-battlefield","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/","title":{"rendered":"Corrupted Open-Source Software Enters The Russian Battlefield"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>It started as an innocent protest. <a href=\"https:\/\/www.npmjs.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Npm<\/a>, JavaScript&#8217;s package manager maintainer RIAEvangelist, Brandon Nozaki Miller, <a href=\"https:\/\/github.com\/RIAEvangelist\/peacenotwar\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">wrote and published an open-code npm source-code package called peacenotwar<\/a>. It did little except add a protest message against Russia&#8217;s invasion of Ukraine. But then, it took a darker turn: It began destroying computers&#8217; file systems.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">Ukraine Crisis<\/span> <\/h3>\n<\/p><\/div>\n<p>To be exact, Miller added code that would <a href=\"https:\/\/snyk.io\/blog\/peacenotwar-malicious-npm-node-ipc-package-vulnerability\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">delete the file system of any computer with a Russian or Belorussian IP address.<\/a> Then, its maintainer added the module as a dependency to the extremely popular node-ipc mode. Node-ipc, in turn, is a popular dependency that many JavaScript programmers use. And it went from annoying to a system destroyer.&nbsp;<\/p>\n<p>The code has undergone several changes since it first appeared, but it must be regarded as highly dangerous. Underlining its potential for damage, Miller encoded his code changes in base-64 to make it harder to spot the problem by simply reading the code.&nbsp;<\/p>\n<p>According to developer security company <a href=\"https:\/\/snyk.io\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Snyk<\/a>, which uncovered the problem, <a href=\"https:\/\/security.snyk.io\/vuln\/SNYK-JS-NODEIPC-2426370\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">&#8220;node-ipc (versions &gt;=10.1.1 &lt;10.1.3) is a malicious package.<\/a> This package contains malicious code that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji.&#8221; It&#8217;s now being tracked as <a href=\"https:\/\/github.com\/advisories\/GHSA-97m3-w2cp-4xx6\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2022-23812<\/a>. Synk gives this corrupted open-was able to source package a critical Common Vulnerability Scoring System (CVSS) rating of 9.8, critical.&nbsp;<\/p>\n<p>In other words, you simply shouldn&#8217;t use it at all. Period.<\/p>\n<p>That&#8217;s easier said than done. Node-ipc is present in many programs. This nodejs module is used for local and remote InterProcess Communication (IPC) on Linux, Mac, and Windows systems. It&#8217;s also used in the very popular <a href=\"https:\/\/cli.vuejs.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">vue-cli<\/a>, a Javascript framework for building web-based user interfaces. From there, this malware wrecked a large number of systems.&nbsp;<\/p>\n<p>Liran Tal, the Snyk researcher who uncovered the problem said, &#8220;Even if the deliberate and dangerous act of maintainer RIAEvangelist will be perceived by some as a legitimate act of protest, how does that reflect on the maintainer&#8217;s future reputation and stake in the developer community?&#8221; Would this maintainer ever be trusted again to not follow up on future acts in such or even more aggressive actions for any projects they participate in?&#8221;<\/p>\n<p>Miller himself defended his peacenotwar module on GitHub, saying &#8220;<a href=\"https:\/\/github.com\/RIAEvangelist\/node-ipc\/issues\/233#issuecomment-1068182278\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">This is all public, documented, licensed and open source.<\/a>&#8221;&nbsp;<\/p>\n<p>But, what if someone did this and didn&#8217;t leave such a message? And, if letting users make an informed decision mattered, why was the dangerous code obscured?&nbsp;<\/p>\n<p>In any case, as we all know, people are lousy at reading documentation. Besides, as <a href=\"https:\/\/www.sophos.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Sophos<\/a> Senior Threat Researcher. Sean Gallagher, tweeted, anyone who just added code willy-nilly to their production systems is asking for trouble. &#8220;If you are live patching dependencies you have no QA controls for, <a href=\"https:\/\/twitter.com\/thepacketrat\/status\/1505673757049954312\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">you are not doing SecOps at all.<\/a>&#8220;<\/p>\n<p>But all that said, this &#8220;protestware&#8221; sets a dangerous precedent. As one programmer on GitHub wrote, &#8220;What&#8217;s going to happen with this is that security teams in Western corporations that have absolutely nothing to do with Russia or politics are going to start seeing<a href=\"https:\/\/github.com\/RIAEvangelist\/node-ipc\/issues\/233#issuecomment-1071969768\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"> free and open-source software as an avenue for supply chain attacks<\/a> (which this totally is) and simply start banning free and open-source software &#8212; all free and open-source software &#8212; within their companies. Or at least all of it which is community maintained. This will have no positive effect for Ukrainians, you idiot, and will only hurt FOSS [Free and open-source software] adoption.&#8221; Exactly so.&nbsp;<\/p>\n<p>In the meantime, in open-source&#8217;s usual fixing its own messes ways, another developer Tyler S. Resch, MidSpike, has started an <a href=\"https:\/\/github.com\/MidSpike\/node-ipc\/issues\/1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">effort to build a safe node-ipc fork on GitHub<\/a>.&nbsp;<\/p>\n<p><strong>Related Stories:<\/strong><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33240\/Corrupted-Open-Source-Software-Enters-The-Russian-Battlefield.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9921],"class_list":["post-45832","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarerussiacyberwarbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Corrupted Open-Source Software Enters The Russian Battlefield 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corrupted Open-Source Software Enters The Russian Battlefield 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-22T15:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Corrupted Open-Source Software Enters The Russian Battlefield\",\"datePublished\":\"2022-03-22T15:03:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/\"},\"wordCount\":629,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\\\/2018\\\/11\\\/28\\\/22f7b0db-3c50-491b-a756-be091e41a9e0\\\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"keywords\":[\"headline,hacker,malware,russia,cyberwar,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/\",\"name\":\"Corrupted Open-Source Software Enters The Russian Battlefield 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\\\/2018\\\/11\\\/28\\\/22f7b0db-3c50-491b-a756-be091e41a9e0\\\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-03-22T15:03:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\\\/2018\\\/11\\\/28\\\/22f7b0db-3c50-491b-a756-be091e41a9e0\\\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\\\/2018\\\/11\\\/28\\\/22f7b0db-3c50-491b-a756-be091e41a9e0\\\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/corrupted-open-source-software-enters-the-russian-battlefield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,russia,cyberwar,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarerussiacyberwarbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Corrupted Open-Source Software Enters The Russian Battlefield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Corrupted Open-Source Software Enters The Russian Battlefield 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/","og_locale":"en_US","og_type":"article","og_title":"Corrupted Open-Source Software Enters The Russian Battlefield 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-22T15:03:10+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Corrupted Open-Source Software Enters The Russian Battlefield","datePublished":"2022-03-22T15:03:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/"},"wordCount":629,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","keywords":["headline,hacker,malware,russia,cyberwar,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/","url":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/","name":"Corrupted Open-Source Software Enters The Russian Battlefield 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-03-22T15:03:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/3e92e29d6ef2d41b06fce821c643374dfa2f3e8a\/2018\/11\/28\/22f7b0db-3c50-491b-a756-be091e41a9e0\/istock-hacker-hands-and-code.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/corrupted-open-source-software-enters-the-russian-battlefield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,russia,cyberwar,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarerussiacyberwarbackdoor\/"},{"@type":"ListItem","position":3,"name":"Corrupted Open-Source Software Enters The Russian Battlefield"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45832"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45832\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}