Self-Propagating Malware Targets Open Source Software, Wipes Iran-Based Machines
A sophisticated malware campaign is infecting open source projects and selectively wiping machines in Iran. Developers are urged to check their networks for signs of infection. This highlights the growing risks in open source ecosystems.

A new strain of self-propagating malware has been discovered infecting open source software projects and selectively targeting machines in Iran. The malware, which spreads through compromised development tools, has been found in several popular repositories. Once infected, the malware lies dormant until it detects an Iranian IP address, at which point it wipes the system.
This attack underscores the vulnerabilities in the open source ecosystem, where trusted projects can be weaponized. The malware's ability to propagate through development tools makes it particularly dangerous, as it can spread silently across multiple projects and organizations. This incident is reminiscent of previous attacks like NotPetya, which also leveraged software supply chains.
The discovery has prompted urgent warnings from cybersecurity firms for developers to audit their networks and tools. The long-term impact of this campaign remains unclear, but it serves as a stark reminder of the need for robust security measures in open source development. As open source software continues to underpin critical infrastructure, such attacks could have far-reaching consequences.