Home » More PyPl packages hacked following phishing attack

More PyPl packages hacked following phishing attack

0 comment

Audio player loading…

Scammers have tricked PyPI Python package maintainers into giving away their login credentials, then used the passwords to log in and taint the packages with malware, experts have claimed.

The news was confirmed by Django project board member Adam Johnson, after being attacked himself, with “hundreds” of packages being affected.

According to the report, an unknown threat actor sent out phishing emails to package maintainers, claiming they need to “validate” themselves, otherwise their packages would be removed from the platform. Johnson said clicking on the link in the email sent the targets to a “fairly convincing” phishing site.

Some maintainers fell for it, the report says, giving their login credentials to the fraudsters. They used that information to hijack “several hundreds” packages, which were later removed from the platform, it was confirmed. Among the malicious things the code does is exfiltrating the endpoint (opens in new tab)’s computer name to domain linkedopports[.]com and downloading a trojan.

“We’re actively reviewing reports of new malicious releases, and ensuring that they are removed and the maintainer accounts restored,” says PyPI. “We’re also working to provide security features like 2FA more prevalent across projects on PyPI.”

Read more

PyPI, the world’s largest Python code repository, with more than 600,000 active users, has been under a barrage of attacks lately. Less than a month ago, researchers found almost a dozen malicious packages, all “typosquats”. Typosquatting is a malware distribution technique in which the malicious package has a name almost identical to the authentic one, carrying only a small “typo”, which might trick developers into downloading and using that one, instead of the authentic one.

Just last week, another dozen malicious packages were discovered, whose goal was to steal (opens in new tab) sensitive data stored in browsers, install backdoors into the Discord client, steal authentication tokens, and payment data.

Via: BleepingComputer (opens in new tab)

Source: Read More

You may also like

Leave a Comment

CyberNonStop

Cybernonstop is created to bring news and knowledge through articles to visitors.

Do not forget to subscribe.

Laest News

@2021 – All Right Reserved. Designed and Developed by PenciDesign