
Research
/Security News
9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.


Sarah Gooding
September 26, 2024
NIST (National Institute of Standards and Technology) is set to update its recommendations for authentication and authenticator management as part of a revision to its Digital Identity Guidelines. The collection of documents provides guidelines for developing information security and risk management practices for Federal Information Systems and Organizations (FISMA).
The document on Authentication & Authenticator Management has been getting a lot of interest recently after hacker Tara DiMotta (@BlackRoomSec) drew attention to some of the most notable changes and enhancements proposed in the latest revision. Specifically, the updated guidelines for password verifiers bring some sanity to the previously cumbersome password requirements, making authentication practices more user-friendly and secure.
NIST is moving away from requiring users to change passwords periodically and is also relaxing the requirements for including special characters. Instead, they focus on the importance of longer, more complex passwords. This is because requiring special characters can lead to weaker passwords as users may resort to easily guessable patterns.
NIST states that “passwords must be of sufficient complexity and secrecy that it would be impractical for an attacker to guess or otherwise discover the correct secret value. A password is ‘something you know.’” The proposed guidelines would be used to verify the identity of individuals accessing government computer systems online, ensuring they are registered and have been authenticated previously.
Towards the objective of enabling users to create more secure passwords, NIST is proposing the following password requirements for verifiers and CSPs (credential service providers):
The elimination of the requirement for funky characters will be a welcome change for those who don’t prefer to use them. @BlackRoomSec explained how it leads to predictable and less secure patterns:
Using complexity rules gets you the user psychology of:
Password1
Password2
and so on
Use phrasing instead and allow for spaces, which is important.Humans type phrases with spaces.
NIST also identified a number of other requirements for password for verifiers, including guiding users in creating strong passwords, implementing rate-limiting for failed attempts, supporting password managers and paste functionality, and providing options to display entered passwords for verification. Additionally, they should allow minor mistypes and ensure the use of approved encryption and secure channels when handling passwords. Verifiers will be required to store passwords in a form that is resistant to offline attacks.
After the comment period for SP800-63B ends on October 7, NIST will review the comments received from the public. NIST will then revise the draft based on the feedback and publish a new version of the guideline. The document doesn’t identify a set timeline for this process, but it typically takes several months.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now

Research
/Security News
Socket researchers discovered nine malicious NuGet packages that use time-delayed payloads to crash applications and corrupt industrial control systems.

Security News
Socket CTO Ahmad Nassri discusses why supply chain attacks now target developer machines and what AI means for the future of enterprise security.

Security News
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.