Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Reliance on Fast-Glob: A Vulnerability in the US Department of Defense's Open-Source Software


The US Department of Defense's reliance on fast-glob, an open-source utility maintained by a Russian developer with ties to Yandex, has raised concerns about the agency's approach to system security. Despite the potential risks associated with this vulnerability, the DoD has thus far failed to respond with meaningful action.

  • The US Department of Defense (DoD) relies on an open-source utility called fast-glob, which is maintained by a single individual with ties to Russia.
  • Fast-glob has gained widespread adoption across various industries and is downloaded over 79 million times a week.
  • The maintainership of fast-glob is attributed to Denis Malinochkin, a Yandex developer based in Russia.
  • Cybersecurity experts warn that relying on an open-source utility with ties to a country with a history of state-sponsored cyberattacks poses significant risks.
  • The DoD has not provided any information regarding their plans for addressing the vulnerability associated with fast-glob.
  • The incident highlights the need for greater vigilance among organizations using open-source software and prioritizing thorough vetting and auditing.



  • The United States Department of Defense (DoD) has come under scrutiny for its reliance on an open-source utility called fast-glob, which is reportedly maintained by a single individual with ties to Russia. This revelation highlights a critical vulnerability in the DoD's use of open-source software and underscores the importance of ensuring that such tools are thoroughly vetted and audited.

    Fast-Glob, a Node.js library for finding files and folders based on specific patterns, has gained widespread adoption across various industries, including government agencies and private sector organizations. According to a report by Hunted Labs, a US-based cybersecurity firm, fast-glob is downloaded over 79 million times a week and utilized by more than 5,000 public projects, in addition to the DoD's systems and container images.

    The maintainership of fast-glob is attributed to an individual known as mrmlnc, who is identified as Denis Malinochkin, a Yandex developer based in Russia. While Hunted Labs did not establish direct ties with Malinochkin prior to publishing its report, the firm discovered that his online profiles and website associated with the handle "mrmlnc" indicated a strong connection to Yandex.

    Hunted Labs' findings have raised concerns among cybersecurity experts, who point to the potential risks associated with relying on an open-source utility maintained by a single individual with ties to a country with a history of state-sponsored cyberattacks. The firm's research suggests that fast-glob could be vulnerable to exploitation by malicious actors seeking to access sensitive information or disrupt systems.

    In an effort to mitigate these risks, Hunted Labs recommends that organizations using fast-glob consider adding additional maintainers and enhancing project oversight. Alternatively, users may need to seek a suitable replacement for the utility. The firm emphasizes that open-source software does not require a confirmed vulnerability (CVE) to be deemed dangerous; rather, access, obscurity, and complacency can all contribute to potential security breaches.

    The reliance on fast-glob by the DoD has sparked questions about the agency's approach to ensuring the security of its systems. In response to inquiries from The Register, the Department of Defense did not provide any information regarding their plans for addressing this vulnerability.

    Furthermore, Hunted Labs' investigation highlights broader concerns surrounding open-source software in general. As noted by the firm, every piece of code written by Russians is not automatically suspect; however, popular packages with no external oversight can be targeted by state or state-backed actors seeking to further their goals.

    US Defense Secretary Pete Hegseth recently stated that the Pentagon would no longer procure any hardware or software susceptible to adversarial foreign influence. In theory, this should prompt swift action from the DoD to address the vulnerability associated with fast-glob. However, a lack of response from the agency raises questions about the effectiveness of their approach to mitigating these risks.

    The revelation surrounding fast-glob and its ties to Yandex has sparked renewed debate about open-source software security and the importance of ensuring that such tools are thoroughly vetted and audited. As Hunted Labs pointed out, "Open source software doesn't need a CVE to be dangerous; it only needs access, obscurity, and complacency." This observation underscores the need for greater vigilance among organizations using open-source software.

    In conclusion, the reliance on fast-glob by the US Department of Defense highlights critical vulnerabilities in the agency's approach to ensuring system security. The lack of response from the DoD regarding this vulnerability raises concerns about their ability to address such risks effectively. As the importance of open-source software continues to grow, it is essential that organizations prioritize thorough vetting and auditing of these tools to prevent potential security breaches.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Reliance-on-Fast-Glob-A-Vulnerability-in-the-US-Department-of-Defenses-Open-Source-Software-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/08/27/popular_nodejs_utility_used_by/


  • Published: Wed Aug 27 17:07:33 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us