DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Malicious Python Packages Found to Mimic Popular Libraries

February 23, 2023
Reading Time: 2 mins read
in Alerts

 

Cybersecurity researchers have identified 41 malicious Python packages on the Python Package Index (PyPI) repository posing as legitimate modules such as HTTP, requests, and urllib3. The malicious packages use names such as aio5, htps1, httiop, httplat, httpscolor, httpsus, and urolib3, among others. The descriptions of these packages appear innocuous, some even make flattering comparisons with legitimate libraries, and the packages are capable of acting as conduits for second-stage malware or stealing sensitive data like passwords and tokens.

The modus operandi of these imposter packages is to poison the open source repositories to propagate malware to developer systems, a growing trend that malicious actors have adopted to mount supply chain attacks. Just this week, Fortinet disclosed similar rogue HTTP packages on PyPI capable of launching a trojan downloader that contains a DLL file (Rdudkye.dll) with various functions.

Typosquatting, where malicious actors use misspellings to create confusion and entice developers to install malware-infested packages with similar-sounding names, is an essential technique for these supply chain attacks. Python is the latest open-source repository to face the challenge of typosquatting after npm, RubyGems, and GitHub were previously targeted.

These incidents once again highlight the need for software developers to be vigilant when downloading packages from open-source repositories. Developers should also ensure that they only use trusted libraries from reliable sources and update their systems regularly to the latest patches and fixes. Additionally, it is essential to implement robust cybersecurity measures and protocols to secure the software supply chain and avoid being vulnerable to malicious attacks.

Read More

Tags: AlertsAlerts 2023February 2023PyPi packagesPython packages
0
VIEWS
ADVERTISEMENT

Related Posts

Unpatched IBM file transfer software at Risk

Unpatched IBM file transfer software at Risk

March 31, 2023
Osprey Pump Controller Vulnerabilities

Osprey Pump Controller Vulnerabilities

March 31, 2023
Super FabriXss vulnerability in Azure

Super FabriXss vulnerability in Azure

March 31, 2023
Tool for Cloud Credential Harvesting

Tool for Cloud Credential Harvesting

March 31, 2023

More Articles

StarHub suffers data breach, but says no system was compromised

August 6, 2021
Incidents

Verizon prepaid accounts hijacked by SIM swap attack

October 20, 2022
Course

Networking in Google Cloud: Defining and Implementing Networks

March 25, 2022
Book

Stay safe while online shopping

December 14, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.