• tal@lemmy.today
    link
    fedilink
    English
    arrow-up
    21
    ·
    edit-2
    10 hours ago

    The incident began from June 2025. Multiple independaent security researchers have assessed that the threat acotor is likely a Chinese state-sponsored group, which would explain the highly selective targeting obseved during the campaign.

    I do kind of wonder about the emacs package management infrastructure system. Like, if attacking things that text editors use online is an actively-used vector.

    • Piatro@programming.dev
      link
      fedilink
      English
      arrow-up
      8
      ·
      6 hours ago

      Text editors with plugin support as potential vectors of malware is a pretty well known problem. It’s why at the very least organisations should be auditing the plugins used and actively monitoring them.

    • samc@feddit.uk
      link
      fedilink
      English
      arrow-up
      5
      ·
      7 hours ago

      Well now I’m nervous! My first instinct though is that the vast majority of Emacs packages are plain elisp, and Emacs users have a habit of cracking open and tinkering with their packages, so any malicious code ought to be spotted quickly.

      With the native compiled modules however, it could be another story…