{"id":146522271,"date":"2023-04-12T12:41:00","date_gmt":"2023-04-12T12:41:00","guid":{"rendered":"https:\/\/danconn.dev\/blog\/2023\/04\/12\/sonatype-malware-monthly-in-dark-reading\/"},"modified":"2024-07-28T10:44:39","modified_gmt":"2024-07-28T10:44:39","slug":"sonatype-malware-monthly-in-dark-reading","status":"publish","type":"post","link":"https:\/\/danconn.dev\/blog\/2023\/04\/12\/sonatype-malware-monthly-in-dark-reading\/","title":{"rendered":"Sonatype Malware Monthly In Dark Reading"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Dark Reading chats to myself and Sonatype researcher Juan Aguirre on his research into a Spanish MaaS group with a blatantly obvious attack<\/h2><p>Well this was something very special to be a part of &#8211; I was very excited to be talking to Dark Reading about a MaaS group. Juan Aguirre had traced this group and these techniques for months and found them hiding in very plain sight with the packasge name \u201creverse-shell\u201d in the PyPI registry!<br\/><br\/><a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/spyware-offered-cyberattackers-pypi-python-repository\">I won\u2019t spoil anymore but make sure you read here! Enjoy!<\/a><br\/><\/p><figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/danconn.dev\/blog\/wp-content\/uploads\/2024\/07\/ce7b9165-34c7-4781-b6f4-ffacb39030c3_1012x694.png\" alt=\"\"\/><\/figure><p><br\/><\/p>","protected":false},"excerpt":{"rendered":"<p>Dark Reading chats to myself and Sonatype researcher Juan Aguirre on his research into a Spanish MaaS group with a blatantly obvious attack<\/p>\n","protected":false},"author":2,"featured_media":147072120,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[12,61,62,58,60,31],"class_list":["post-146522271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications","tag-application-security","tag-dark-reading","tag-maas","tag-malware","tag-malware-monthly","tag-sonatype"],"_links":{"self":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146522271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/comments?post=146522271"}],"version-history":[{"count":1,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146522271\/revisions"}],"predecessor-version":[{"id":147072252,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146522271\/revisions\/147072252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/media\/147072120"}],"wp:attachment":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/media?parent=146522271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/categories?post=146522271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/tags?post=146522271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}