Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Malware package uploads targeting developers surge, PyPI stops registration
    Cyber Security

    Malware package uploads targeting developers surge, PyPI stops registration

    techempireBy techempire5 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 29, 2024Editorial DepartmentSupply Chain Attack/Threat Intelligence

    Malicious packets

    The maintainers of the Python Package Index (PyPI) repository have temporarily suspended new user registrations after a large number of malicious projects were uploaded in a malicious cybersquatting campaign.

    It said “new project creation and new user registration” were temporarily suspended to mitigate what it called “malware upload activity.” The incident was resolved 10 hours later, at 12:56 pm (UTC) on March 28, 2024.

    Software supply chain security company Checkmarx said the unknown threat actor who flooded the repository targeted misspelled versions of popular software packages.

    Researchers Yehuda Gelb, Jossef Harush Kadouri and Tzachi Zornstain said: “This is a multi-stage attack with a malicious payload designed to steal crypto wallets, sensitive data in the browser (cookies, extensions, etc.) and various credentials.” “In addition , the malicious payload employs a persistence mechanism to survive reboots.”

    These findings were also independently confirmed by Mend.io, which noted that it detected more than 100 malware packages targeting machine learning (ML) libraries such as Pytorch, Matplotlib, and Selenium.

    Internet security

    The development comes at a time when open source repositories are increasingly becoming an attack vector for threat actors to penetrate enterprise environments.

    Phishing is a well-documented attack technique in which attackers upload packages with names that closely resemble their legitimate counterparts (for example, Matplotlib vs. Matplotlib). Food plot Or tensorflow comparison tensorflow) to trick unsuspecting users into downloading them.

    The deceptive variants, totaling more than 500 packages per checkpoint, were found to have been uploaded from a unique account starting on March 26, 2024, suggesting that the entire process was automated.

    “The fragmented nature of the uploads, with each package attributed to a different user, further complicates the effort to cross-identify these malicious entries,” the Israeli cybersecurity company said.

    Malicious packets

    Cybersecurity firm Phylum, which has been tracking the same campaign, said the attackers posted –

    • 67 requirements changes
    • 38 variations of Matplotlib
    • 36 request variations
    • 35 color variations
    • 29 variations of tensorflow
    • 28 Variations of Selenium
    • 26 variations of BeautifulSoup
    • 26 variants of PyTorch
    • 20 different pillows
    • 15 variations of asyncio

    For their part, these packages check whether the installer’s operating system is Windows and, if so, proceed to download and execute an obfuscated payload retrieved from an actor-controlled domain (“funcaptcha”)[.]Ru”).

    Internet security

    The malware acted as a stealer, stealing files, Discord tokens, and data from web browsers and cryptocurrency wallets to the same server. It also attempts to download a Python script (“hvnc.py”) to the Windows startup folder for persistence.

    This development once again illustrates the escalating risks posed by software supply chain attacks, so developers must carefully review every third-party component to ensure it protects against potential threats.

    This isn’t the first time PyPI has taken this step. In May 2023, it temporarily banned user registrations after discovering that “the number of malicious users and malicious projects created on the index over the past week exceeded our ability to respond in a timely manner.”

    For similar reasons, PyPI suspended new user registrations for the second time on December 27 last year. Subsequently canceled on January 2, 2024.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.