![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyBWA2fNLLjw80Bf9v95IYfTDKWCya9F8VXV5z4i6SSFCgNzazpqTXuCTIxCWIWN-TzL_3VE5FlOYON7M78yclVr_WX7Tg6Um9l-88EoVvVc2YAlaMcPK--VZLOuiyUCpvm7J_tc9uXq1smho6Jvq4lcuj3srlaBZ6a5YceTe8DMCJJ2VcXhlVl_9Bp3Jq/s1600/rust.jpg)
In yet another sign that developers continue to be targets of software supply chain attacks, a number of malicious packages have been discovered on the Rust programming language’s crate registry.
The libraries, uploaded between August 14 and 16, 2023, were published by a user named “amaperf,” Phylum said in a report published last week. The names of the packages, now taken down, are as follows:
Source:: The Hackers News