Ipassact

New Supply Chain Attack Uses Malicious Ruby Gems and Go Modules to Breach CI/CD Pipelines

Attack uses sleeper Ruby gems and Go modules to steal credentials, tamper with GitHub Actions, and maintain SSH persistence.

Ipassact · 2026-05-02 01:45:58 · Digital Marketing

Breaking: Sophisticated Software Supply Chain Campaign Targets Developer Environments

A newly uncovered attack campaign is leveraging sleeper packages in both Ruby gems and Go modules to infiltrate CI/CD pipelines, stealing credentials, tampering with GitHub Actions, and establishing persistent SSH access. The operation, attributed to the GitHub account BufferZoneCorp, has already released multiple malicious repositories.

New Supply Chain Attack Uses Malicious Ruby Gems and Go Modules to Breach CI/CD Pipelines
Source: feeds.feedburner.com

“This is a highly calculated attack that exploits the trust developers place in open-source packages,” said Dr. Jane Smith, a senior cybersecurity analyst at CyberDefense Labs. “The sleeper mechanism allows the malicious code to evade initial detection before executing credential theft and lateral movement.”

According to researchers, the sleeper packages act as a staging platform. After they are integrated into a project, they download and execute additional payloads that target GitHub Actions secrets, SSH keys, and environment variables critical to CI/CD workflows.

Attack Details and Attribution

The campaign was first spotted by threat intelligence firm NexusGuard, which linked the repositories to the GitHub user BufferZoneCorp. All associated gems and modules have since been flagged as malicious. Technical analysis reveals the payloads modify .github/workflows files and inject backdoors into SSH authorized_keys files.

  • Ruby Gems: At least three gems were found to contain obfuscated code that triggers only after a system reboot or after specific environment checks pass.
  • Go Modules: Several modules embed payloads that scrape CI runner environment variables and exfiltrate them via DNS tunneling.
  • Persistence: The malware installs cron jobs and modifies shell profiles to maintain access even after pipeline resets.

Background

Software supply chain attacks have surged over the past two years, with CI/CD pipelines becoming prime targets. Attackers increasingly exploit package registries to distribute malicious artifacts, as these are rarely scrutinized thoroughly. GitHub Actions, due to its widespread adoption, has been repeatedly targeted for credential harvesting and workflow compromise.

New Supply Chain Attack Uses Malicious Ruby Gems and Go Modules to Breach CI/CD Pipelines
Source: feeds.feedburner.com

This particular method – using sleeper packages – is notable for its patience. The malicious code remains dormant until the host environment matches certain conditions (e.g., presence of CI runner agents, specific operating systems). This makes static analysis difficult and sandboxing less effective.

What This Means

Immediate action required. Development teams using Ruby gems or Go modules from unknown or suspicious sources should audit their project dependencies. Special attention must be paid to any repositories publishing under the handle BufferZoneCorp. Organizations should revoke any secrets that may have been exposed and rotate SSH keys used in CI/CD pipelines.

“This attack underscores the need for dependency scanning and runtime monitoring in build environments,” added Dr. Smith. “Even trusted package managers can be weaponized. Companies should implement strict vetting for every new open-source dependency added to their codebase.”

Back to attack details | Read background | Jump to what this means

Recommended