The security engineers of the Python Package Index (PyPI) have recently detected 11 malicious Python packages that were downloaded more than 41,000 times, and these malicious Python packages were used by the threat actors to steal access tokens and passwords.
But luckily all these 11 malicious Python packages were removed by them since it is the official third-party software closet for Python.
These libraries have stolen user data that include Discord tokens as well as passwords. After that, it generally installed shells on victims’ systems so that the threat actors can easily access the system of the victim.
Here we have mentioned all the reported packages that were removed:-
The threat actors generally target package managers, as its keeps growing and are one of the powerful vectors for accidental installation. But with these new 11 malicious packages, the operators noticed that the threat actors are becoming more complex with their every operation.
Novel exfiltration or even DNS tunneling, that is the most advanced as well as one of the tricky methods that are used in these malware packages. But luckily, the operators of the PyPI have detected all the 11 malicious Python packages.
In order to hide the communications with the C2 server the very first method that is used, Fastly CDN. However, the Fastly CDN host uses the Varnish transparent HTTP proxy to hide the communication that has been done between clients and the backend.
This whole process keeps repeating, and once it’s fixed it does all its work by itself in the reverse direction. However, this process generally allows the malware to copy the duplex communication along with PyPI
Here, most of these malicious packages are generally based on very famous open-source “stealer utilities,” and it has been noted that it hides the malicious code as a dependency.
However, its also being cleared that the malware has two parts, and here they are mentioned below:-
While it’s true that they have detected all the 11 malicious Python packages, but there are a lot more to know about these type of malicious package.
But, this kind of malicious packagers is getting more sophisticated, and it’s becoming a threat for PyPI. That’s why developers need to take extra care so that they must be alerted by this kind of attack.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.
In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii…
Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using…
The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and…
In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of…
A recent campaign has been observed to be delivering DJvu ransomware through a loader that…
In a pivotal update to the Okta security incident divulged in October 2023, Okta Security…