frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Crates.io phishing attempt

https://fasterthanli.me/articles/crates-io-phishing-attempt
97•dmarto•1h ago
Rust Blog Post: https://blog.rust-lang.org/2025/09/12/crates-io-phishing-cam...

Comments

dmarto•1h ago
Heh, the phishing page now redirects to a rickroll.
shepmaster•1h ago
An official post about this is at

https://blog.rust-lang.org/2025/09/12/crates-io-phishing-cam...

coldfoundry•1h ago
Why does it seem like phishing is popular again? Maybe bad actors forgot how gullible humans were? I get phishing attempts nearly daily via email or sms and I honestly thought “Who would fall for this?” every time one came in.

The only phishing I can see that would be extremely hard to detect are browser extension injections (either in extension window or page replacement) so the domain is legitimate.

koakuma-chan•1h ago
Phishing attempts are usually low-effort and easily seen through, npmjs.help one was good though.
stronglikedan•50m ago
> low-effort and easily seen through

To make up for that, they cast a wide net. It's a numbers game, like the guys that ask every single woman they meet for their phone number. It costs nothing or next to it, and all you need is one for a payoff.

koakuma-chan•43m ago
I think that if you actually make a proper phishing website, get an actually plausible domain, and not make spelling mistakes, you can increase your conversion rate dramatically. Also why do they ask for a phone number if you can just ask her out right away.
diggan•1h ago
> Why does it seem like phishing is popular again?

Was it ever not popular? Looking at my spam box, I receive countless of phishing attempts per week, and doing some quick queries of the total count over time, it seems to more or less been the same for the last 2-3 years at the very least.

I'm not sure why it's such big news all of a sudden, probably because it recently succeeded against a developer of some popular npm packages?

I think most people either have the phishing emails flagged, so they never see them. The ones that get seen, get ignored as obvious phishing. And for the ones that click the link, their password manager would stop them from entering their detail. And then you have the final 0.0001% who never protected themselves, and were tired/stressed at that very moment, and fell for it.

So I guess ultimately it's bound to become news every now and then, until everyone finally got the memo to get a proper password manager that don't show accounts that don't belong to the domain.

EvanAnderson•1h ago
From my perspective, adjacent to front-line end user IT support in a lot of the work I do, phishing has never not been popular in the last couple decades.

It feels like it has become significantly more prevalent in the last couple years (tracking the rise of "business email compromise" being a term-of-art).

WesolyKubeczek•1h ago
When you grab a domain which is plausibly very similar to the legit domain the organization you work with is using, you can forge emails that will make your email client show all sorts of “verification passed” badges next to them.

You can further appeal to developers’ geeky hearts by not making language mistakes and actually using verbiage present in real emails as sent by them.

You can exploit recent supply chain attacks and the sense of urgency and panic that developer blogs have created by pressing for even more urgency.

Seems like this does work. Don’t worry, when they actually target you, you’ll be caught.

tialaramex•38m ago
> Don’t worry, when they actually target you, you’ll be caught.

When they target me, which happens, it doesn't work because of WebAuthn.

Buy a Security Key. If you think you might lose it, buy at least two more. For critical sites like GitHub (which was targeted here) set up your Security Keys and get into the habit of relying on them. It's the same philosophy as Rust itself, machines are really good at diligently performing a simple task, so don't leave those tasks to human vigilance, that is a foolish misallocation of resources.

immibis•30m ago
"Your WebAuthn key enrollment period has expired. Please log in to re-enroll a new key."

Something similar to this was in the recent npmjs thing.

pmichaud•1h ago
I experience and wonder the same thing, but literally yesterday I had to help my grandmother recover from a phishing scam that actually (very nearly) worked on her. So there you go.
Workaccount2•1h ago
The worst (or best, I suppose) thing about phishing is that it automatically filters in the fools for you.
diggan•58m ago
Is that different from other types of scams? You could say the same about most of them, they automatically filter away people not falling for it?
stravant•58m ago
People realized that past phishing attempts were quite badly constructed and a well constructed one is actually really easy to fall for.
diggan•56m ago
> and a well constructed one is actually really easy to fall for

It really shouldn't though, and something you need to be personally responsible for. If it's still possible in 2025 for you to fall for phishing attempts, you're missing something, something that starts with a p and ends with a assword manager.

oguz-ismail•53m ago
Nah, I can manage my own ass words. I wouldn't trust a third party have access to all of them anyway
JW_00000•14m ago
You must be joking. When I try to log in on Outlook I get redirected to 'microsoftonline.com' (suspicious), when I log in on Wikipedia it sends me to something called 'wikimedia.org' (typo squatter?). How the hell am I supposed to know whether npmjs.help or rustfoundation.dev are _not_ the official domains of those projects?
diggan•8m ago
> You must be joking.

You must be joking, are you still not using a password manager at all?

When you create the username+password combo you either do it yourself, then put in the password manager the domain, or you use whatever the password manager infers at the registration page, then that's basically it, for most sites. Then 1% of the websites insist to use signin.example.com for login and signup.example.com for signup, so you add both domains to your password manager, or example.com.

Now whenever you login, you either see a list of accounts (means you're on the right domain) or you don't (which means the domain isn't correct). And before people whine about "autofill doesn't always work", it doesn't matter, the list should (also) show up from the extension modal/popup, so even if autofill doesn't work for that website, you'd be protected, since the list of accounts are empty for wrong domains.

It's really easy, and migrating to a password manager just sucks the first couple of days, every day after that you'd be happy you finally did it.

whatamidoingyo•50m ago
> People realized that past phishing attempts were quite badly constructed

I seem to recall that the typos and grammar errors were intentional. This gets rid of skeptical people, and you're left with those who are extremely gullible and likely to fall for it.

rkomorn•49m ago
First time I've heard this but it actually makes an awful lot of sense.
khy•55m ago
A little thing that doesn't help the situation is when legitimate emails link you to domains that aren't obviously controlled by the company.

For example, yesterday at work I got an onboarding email from Lattice (lattice.com) with a link to latticehq.com, which triggered my phishing instincts before I remembered that was their old domain.

kannanvijayan•54m ago
Pure speculation - but I'm wondering if one or a few of the black hat players has figured out a good way to leverage AI to phish more effectively at scale, and are taking a stab at all the venues that host code that's within a lot of dependency chains.
entropie•46m ago
You might be on point:

https://www.anthropic.com/news/detecting-countering-misuse-a...

stusmall•54m ago
It never became unpopular. It's one of, if not the, leading cause of compromise.
shit_game•5m ago
I can't imagine that the absurd number of greenhorns entering the industry due to their "vibecoding prowess", or the inevitable number of people in management that perpetuate this fantasy of nocoder devs has anything to do with it. Surely not.
tracker1•4m ago
One of the worst, my SO approved "notifications" on some website.. and was getting viral alert notifications via that system. It looks like a typical tray notification in windows, and other than it's got a chrome header, it would be pretty easy to fall for. And this is why, before they passed, one of my Grandmothers was on Linux, and my other was on a Chromebook... no cleaning off random Windows malware twice a year.
prameshbajra•56m ago
That email looked very genuine. I would have fallen for it. Not gonna lie.
twodave•41m ago
Being asked to login via an “internal login page” is a huge, bright red flag. It doesn’t matter what the reasoning is, if it’s not the same domain or an SSO integration that is well known to both you and the vendor then you shouldn’t be using it. This is security 101 type stuff.
hu3•18m ago
I've grown old enough to ignore sense of urgency when coupled with authentication.

That e-mail does not pass my sniff test.

burntsushi•7m ago
My bluesky post was the one quoted in the OP.

I do think it was a decent attempt. A phishing attempt making it past gmail's spam filter is somewhat rare for me. Certainly less than weekly. And something this targeted is definitely a ~yearly occurrence (or less).

The major tip-offs for me were:

1. It was weird to be getting this from the Rust Foundation. The phishers likely don't understand Rust's governance structure. It's a common misconception shared by outsiders.

2. If a security incident like this would have occurred, there would have 100% been some kind of public communication about it on the rust-lang.org domain. I get notified whenever there's a new post there. So I knew this wasn't referencing a real event.

3. I also knew that crates.io doesn't manage authentication. It farms that out to GitHub. So the crates.io people wouldn't be communicating to me about my GitHub credentials being compromised. It didn't make sense.

And then finally, the URL is funny.

The somewhat scary part here though is that all of my points above come from being pretty dialed into the Rust organization and how things actually work.

But yeah, as a general rule of thumb, I always question any email asking me to log into something that wasn't just activated by me (like a "forgot my password" flow or something).

Finally, when I worked at Salesforce, the IT team there would occasionally send out fake phishing emails and ask you to report them to the team. I never fell for one, but I assume if I had, I would have been notified about it. I thought it was a very effective campaign because it always kept me on my toes.

vlovich123•53m ago
Seems like identical approach to the npm phishing attempts. There was some good suggestions last time like locking down the ability to upload packages for a few days after a security change.
ranger207•50m ago
If you get a message (text, email or call), it's best to not trust the contents of the message until you verify it by logging in or whatever yourself. If crates.io says you have a problem, close the email and go to crates.io yourself. If your bank calls you, hang up and log in or call their support number yourself. Don't trust anyone contacting you for sensitive stuff
warwren•43m ago
Sage advice
larrik•35m ago
Definitely. I get scammers calling me from a caller id that claims to be my bank asking about suspicious charges, and they know my name and have my account info, but they ask for my full credit card number to "verify" it. Yet, they give different suspicious charges every time you ask.

The worst part is that when I call the bank to see if its legit, they are much less pleasant to deal with than the scammers...

pipo234•27m ago
> The worst part is that when I call the bank to see if its legit, they are much less pleasant to deal with than the scammers...

+1

This is so true. I just never realized that is why I'm always tempted to not bother doing the right thing.

SketchySeaBeast•26m ago
I've stopped trying to call - if I think there's a problem I go into my local branch. Much harder to put me on hold for 40 minutes and then hang up in person.
rustc•19m ago
> If your bank calls you, hang up and log in or call their support number yourself.

And don't trust the number you see on Google. Google is known to show scammers' phone numbers in featured snippets or in their new "AI Mode". Click on the link and make sure it's the correct site before trusting the number.

itissid•15m ago
Always good advice for anything. A variation of this is that you should also not answer the negative: that you definitely did not do something, if someone asks you that on a phone call. This is meant to spread harm to others.

I was speaking to a pharmacist yesterday. Apparently certain pharmacy insurance companies in the US have set up call centers that randomly call people and ask.

"We are from the fraud check department. Did you ask for receiving XYZ medication that your insurance paid $$$$$$ for?". The guy who does who's salary is an order of magnitude smaller, immediately panics and denies he ever asked for XYZ, even though they are obviously taking the medication. The purpose is of-course for pharmacy insurance companies to challenge/deny claims for on ALL XYZ orders the pharmacy made.

Of course checking insurance payouts is a hassle so most people reach for panic first and shortly thereafter denial.

tracker1•12m ago
That's just icky.
tracker1•14m ago
The spammy calls I've gotten lately are for "tax help from the IRS" ... I really feel there's a special place in hell for people that do that.
otterley•40m ago
GitHub supports passkeys. Just a friendly reminder for everyone to update their accounts to require passkey auth to prevent credential stealing.

https://docs.github.com/en/authentication/authenticating-wit...

hombre_fatal•40m ago
I got an official email from Paypal last week saying that I had a charge for $900 at Kraken, and to call some number if it's suspicious.

What's great about the attack is that it's sent from paypal.com and signed by paypal. And the email contains a legit link to paypal, not some phishing site. But the phone number is the attack.

The attack:

1. Register a paypal business account

2. Add the victim's email address (or one that forwards to them) to the biz account's "secondary users"

3. Add a custom invitation message about how they have a $900 charge that they need to contest by calling a phone number that you control.

4. Paypal shows your custom invitation message inline with their official email with no indication that it was written by someone other than paypal (wtf?)

Here's the email that was of course surrounded by Paypal's own official email chrome:

> New Profile Charge: We have detected a new payment profile with a charge of $910.45 USD at Kraken.com. To dispute, contact PayPal at (805) 500-8413. Otherwise, no action is required. PayPal accept automatic pending bill from this account.Your New PayPal Account added you to the Crypto Wallet account.

I called the number and some guy started asking me for my info starting with my full name. I didn't hang around on the call long enough to see what the attack was, but it probably involves buying crypto -- either you or them through your account.

gbalduzzi•37m ago
Let's say someone falls for this.

What happens next, when they become the business account secondary user?

hombre_fatal•32m ago
I added to my comment, but when you call the number, you talk to the attacker and they ask you questions about you and your account. Maybe they try to buy crypto with it or they prime you to go to some attack website and use your paypal account to buy something.
edm0nd•12m ago
oh no, not at all.

They will attempt to get you to install AnyDesk or some kind of remote software and then pwn your computer. They will remote in "to fix the hack" because your computer is obviously infected with a virus. Then either just steal your money from your bank account or etc.

sschueller•35m ago
This kind of incompetence should result in PayPal loosing its banking permits in the EU. This is unacceptable and there is no way for an average person to identify the fraud and that is PayPal's fault.

There should be no way to send custom text from Paypal to a stranger. They don't even parse out phone numbers!

coldfoundry•29m ago
Wow, thats pretty bad. Reminds me of the old Paypal Invoice scams where scammers would upload the paypal logo as the invoice logo (which appears top left) and essentially “bill” the user. The scammer the adds inside the invoice note a paragraph explaining “Your money is being held due to currency exchange issues”, which gives basic reason to the “monetary deduction”. It got me as a kid, was quite slick for the time. Thought these scam-methods would be at least flagged these days before going out.
arjie•26m ago
This is funny. The site https://github.rustfoundation.dev now only contains a single image that is the buff doge vs cheems meme.

Chad Rust Devs

vs.

Virgin NPM Devs Falling For Phishing

Amusing. You have to ignore SSL to get the image since the site has HSTS enabled.

A coincidence is that today I got a "two factor code from Coinbase. If you did not request this, call this number". Ho ho ho. Yes, I will call your number, Coinbase.

testdelacc1•25m ago
That's an exceptionally well crafted phishing email and landing page. It looks so real! Even the URL looks legit - github.rustfoundation.dev (the real URL is rustfoundation.org).

Btw, if you go to https://rustfoundation.dev right now it says in meme format: Virgin npm devs falling for phishing (sleepy doge) vs Chad Rust devs (shredded doge).

As chad as Rust devs supposedly are, something tells me at least a few of them are going to fall for this attack.

carols10cents•4m ago
Yeah, npm has orders of magnitude more users than crates.io. This attack's success, or lack thereof, has no bearing on the savviness of JavaScript or Rust developers.

Software Bill of Materials Requirements in DoD and Federal Guidance

https://eclypsium.com/blog/sbom-federal-requirements-guidelines/
1•cws•43s ago•0 comments

Microsoft swerves EU antitrust fine with price deal for unbundled Teams

https://www.reuters.com/sustainability/boards-policy-regulation/microsoft-swerves-eu-antitrust-fi...
1•pqtyw•2m ago•0 comments

Taste

https://www.moderndescartes.com/essays/taste/
1•brilee•3m ago•0 comments

Magic Mushroom Edibles Found to Contain Undisclosed Ingredients–No Psilocybin

https://www.scientificamerican.com/article/magic-mushroom-edibles-found-to-contain-no-psilocybin/
2•Brajeshwar•3m ago•1 comments

Researchers find oldest written claim that the Shroud of Turin was faked

https://www.cnn.com/2025/09/04/science/shroud-of-turin-oresme-philosopher
1•Brajeshwar•3m ago•0 comments

Man, 34, has tooth implanted in eye to restore his vision

https://www.today.com/health/men-s-health/tooth-in-eye-surgery-restores-vision-rcna230395
2•coloneltcb•5m ago•0 comments

Removing newlines in FASTA file increases ZSTD compression ratio by 10x

https://log.bede.im/2025/09/12/zstandard-long-range-genomes.html
2•bede•8m ago•0 comments

Making Discogs Data 13% Smaller with Parquet

https://harmonique.one/posts/making-discogs-data-13-smaller-with-parquet
2•futurecat•8m ago•0 comments

Proxmox-GitOps: Extensible GitOps IaC Container Automation for Proxmox VE (8.4+)

https://github.com/stevius10/Proxmox-GitOps
1•stevius•11m ago•1 comments

RTX 5090 With 128 GB VRAM Mod Is on Sale for $13,000

https://www.extremetech.com/computing/rtx-5090-with-128-gb-vram-mod-is-on-sale-for-13000
2•a_void_sky•14m ago•0 comments

New pathway engineered into plants lets them suck up more CO₂

https://arstechnica.com/science/2025/09/new-pathway-engineered-into-plants-lets-them-suck-up-more...
2•manveerc•16m ago•0 comments

Show HN: Lumro – AI agents for customer support, sales, and more

https://www.lumro.co/
1•Ophilip•17m ago•0 comments

VaultGemma: The most capable differentially private LLM

https://research.google/blog/vaultgemma-the-worlds-most-capable-differentially-private-llm/
2•meetpateltech•18m ago•0 comments

Enceladus, the Life Signs That Weren't

https://www.universetoday.com/articles/enceladus-the-life-signs-that-werent
1•belter•19m ago•0 comments

Corporations are trying, and now failing, to hide job openings from US citizens

https://thehill.com/opinion/finance/5498346-corporate-america-has-been-trying-to-hide-job-opening...
7•b_mc2•19m ago•0 comments

China bans one-pedal driving in default modes by 2027

http://www.asiaict.com/icv/10236.html
5•jerlam•24m ago•2 comments

MAAS Fabrics: The Cartoon Version

https://discourse.maas.io/t/show-and-tell-maas-fabrics/14913
1•billwear•24m ago•1 comments

GraalVM's LLVM Back End

https://www.praj.in/posts/2020/graalvms-secret-llvm-backend/
1•aarroyoc•25m ago•0 comments

The Scam of All Scams

https://www.citationneeded.news/issue-92/
2•wslh•26m ago•0 comments

OpenAI Grove

https://openai.com/index/openai-grove/
1•manveerc•27m ago•1 comments

America now leads the world in surveillanceware investment

https://www.theregister.com/2025/09/11/us_surveillanceware_investment/
4•rntn•29m ago•1 comments

Are We There Yet? Future of C++ Software Development – Sean Parent – C++Now 2025 [video]

https://www.youtube.com/watch?v=RK3CEJRaznw
1•olvy0•30m ago•0 comments

Show HN: Free AI Business Name Generator and Domain Avalibility

https://namegator.lovable.app/
1•egldmila•30m ago•0 comments

Shape-changing tensegrity-blocks enable self-assembling robotic structuress

https://www.nature.com/articles/s41467-025-60982-0
1•PaulHoule•31m ago•0 comments

Ankit Gupta Joins YC as General Partner, Bringing Deep ML Expertise

https://www.ycombinator.com/blog/welcome-ankit/
2•todsacerdoti•32m ago•0 comments

MCP Server Could Have Been a JSON File

https://materializedview.io/p/mcp-server-could-have-been-json-file
1•vinhnx•33m ago•0 comments

Functional synapses between neurons and small cell lung cancer

https://www.nature.com/articles/s41586-025-09434-9
2•bookofjoe•35m ago•0 comments

Nvidia and OpenAI to back major investment in UK AI infrastructure

https://www.cnbc.com/2025/09/12/nvidia-and-openai-to-back-major-investment-in-uk-ai-infrastructur...
1•gslin•35m ago•0 comments

Netherlands joins Ireland will boycott 2026 Eurovision if Israel participates

https://nltimes.nl/2025/09/12/netherlands-will-boycott-2026-eurovision-israel-participates-says-b...
6•belter•35m ago•0 comments

Remotion – Make Videos Programmatically

https://www.remotion.dev/
1•mifydev•35m ago•0 comments