The security community recently turned the alarms on again: malicious packages written in Rust have been detected that were coming tocrates.iowith an innocent look and a simple promise: utilities to synchronize or calibrate local time without relying on NTP. However, under this facade, much more dangerous behavior was hidden: the removal of secrets from the development environments - especially .env files - and their sending to servers controlled by the attackers.
The investigation, detailed by the firm Socket, identifies five crates published between late February and early March 2026 with names that imitated time profits, among them Chrono _ anchor, dnp3times, time _ calibrator, time _ calibrators and time-sync. According to analysts, they all share the same exfiltration technique and a common data reception infrastructure that uses a legitimate time service impersonator domain, which points to the action of a single malicious actor. You can read the technical analysis on the Socket blog: socket.dev.

What is particularly disturbing about this case is the selection of the target: .env files are a regular target because they usually contain API keys, access tokens and other sensitive credentials that, if they fall into the wrong hands, allow to climb up to cloud services, databases or even publication in records and repositories with high permissions. The malicious packages were designed to read these files when the code was run in development environments or in continuous integration pipelines, and to transmit its content to the attacker's infrastructure.
Among the packages detected, Chrono _ anchor It was highlighted by its explicit attempt to camouflage malicious functionality: the extraction logic was found in a file called guard.rs and was invoked from an optional auxiliary function, reducing the likelihood that a developer would distrust. In addition, instead of trying to maintain persistence through programmed services or tasks in the system, the strategy here was to repeat the exfiltration each time the rate was run in an CI flow, thus multiplying the impact if the package was integrated into an automated pipeline.
The immediate recommendation, which they have already put on the table both Socket and other signatures, is to assume the worst hypothesis for any equipment that has been able to download or integrate these packages: key and tokens rotation, comprehensive audit of CI / CD work that has publication or deployment permits, and reduction of network output capacity from the runners where the pipelines are run. Socket sums up the lesson well: controls that block malicious dependencies before they are executed are much more effective than trying to contain the leak once it has started.
This incident does not come in isolation. In parallel we have seen automated campaigns that directly attack GitHub Actions' pipelines with artificial intelligence-driven bots. An example documented by StepSecurity describes how an automated agent, self-called hackerbot-claw, inspected public repositories to search for poorly configured workflows, created forks and requested apparently safe pull requests to force the execution of workflows to capture secrets present in runners. The StepSecurity report explains in detail this modus operandi and how the use of flows like pull _ request _ target can be used by attackers: stepsecurity.io.
One of the most recent media cases involved the Aqua Security Trivy tool, where an exploited workflow allowed the attacker to publish a malicious version of the Visual Studio extension in the Open VSX record. This extension included instructions to execute AI code assistants in a very permissive way and to collect system information, which was then channelled to a repository using the credentials of the one who had executed the flow. Aqua Security published details and mitigation in its official forum, while Socket investigated and published its own findings on the unauthorized execution of AI agents: Aqua's statement and Socket analysis.

These incidents offer a clear lesson for developers and security equipment: the software supply chain is a critical surface and each unit, as small as it may seem, can become an attack vector. In addition to reactive actions - the elimination of affected units and rotation of credentials - it is essential to take preventive measures on two fronts: control of units and tightening of pipelines. Tools like RustSec and cargo-audit help identify vulnerable or committed packages in Rust projects, and GitHub's security guides on Actions offer practices to reduce the risk of unreliable code execution in runners: Security harassment for GitHub Actions. It is also recommended to review the policies of access to tokens, to avoid using credentials with writing permits fired by pull requests for external contributions, and to establish network exit barriers from runners where possible.
If your project could have consumed any of these crates, it is wise to assume that there has been exposure: it eliminates the affected units, revokes and replaces keys and tokens that may have been used by the pipelines, inspects both local and remote repositories in search of unexpected activity and reviews the permissions in the CI flows. The community and platforms have been quick to delete malicious packages from the records, but that does not eliminate the risk if they were already downloaded and executed.
Ultimately, these incidents show that even low-complexity code can cause significant damage if it is executed in the right place and time. Protecting the supply chain and prioritizing early detection of malicious dependencies are actions that can no longer be left for later.. Maintaining safety practices in development and in pipelines has become an operational need, not an option.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...