Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PyPI Blocks 1800 Expired Domain Emails

August 19, 2025
Reading Time: 3 mins read
in Alerts
PyPI Blocks 1800 Expired Domain Emails

The Python Package Index (PyPI), a critical repository for the Python programming language, has implemented a new security measure to strengthen its defenses against supply chain attacks. This update specifically targets a vulnerability known as a domain resurrection attack. The core of this issue lies in the fact that email addresses used for PyPI accounts are tied to domain names that can expire if not renewed. If a domain lapses, an attacker can acquire it and use it to take control of a PyPI account through a password reset request. By checking for and un-verifying accounts with expired domains, PyPI is closing a significant security gap.

The new security check directly addresses a weakness in PyPI’s account verification process. While users are required to verify their email addresses upon registration, this initial layer of defense becomes ineffective if the domain associated with that email address expires. An attacker can then purchase the lapsed domain, effectively gaining control of the email inbox. This allows them to initiate a password reset on the PyPI account and receive the reset link, thereby hijacking the account. This vulnerability is particularly concerning for abandoned packages that are still widely used, as their original maintainers are unlikely to notice or prevent the attack.

In response to this threat, PyPI has begun automatically un-verifying email addresses whose domains have entered an expiration phase. Since early June 2025, PyPI has already un-verified over 1,800 email addresses. While this isn’t a complete solution, it serves as a powerful deterrent. It makes it significantly harder for attackers to exploit expired domains to gain unauthorized access. This proactive step helps to plug a supply chain attack vector that would otherwise appear legitimate and be very difficult for developers to detect.

This update is a crucial step in improving the overall account security posture of PyPI. As stated by Mike Fiedler, a safety and security engineer at the Python Software Foundation (PSF), the changes make it more difficult for attackers to exploit this specific vulnerability. It highlights the ongoing nature of cybersecurity, especially within the context of open-source repositories where a single compromised package can have a cascading effect across numerous downstream projects. The security of the software supply chain is paramount, and measures like this are essential to maintaining trust and integrity within the development community.

The new policy serves as a reminder for all open-source developers to ensure their account information, particularly their email addresses and associated domains, are current and secure. The increasing sophistication of supply chain attacks necessitates a layered security approach. While PyPI is taking steps to protect its users, developers also share the responsibility of keeping their credentials up-to-date and using best practices, such as multi-factor authentication (MFA), to further protect their accounts. This combined effort is key to safeguarding the open-source ecosystem from malicious actors.

Reference:

  • PyPI Blocks 1800 Expired Domain Emails to Prevent Account Takeovers and Attacks
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025
Unreported Domains Expose Salt Typhoon

Unreported Domains Expose Salt Typhoon

September 10, 2025
Microsoft Warns of AD DS Flaw

Microsoft Warns of AD DS Flaw

September 10, 2025
Microsoft Warns of AD DS Flaw

Hackers Exploit Adobe Commerce Bug

September 10, 2025

Latest Alerts

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Unreported Domains Expose Salt Typhoon

Hackers Exploit Adobe Commerce Bug

Microsoft Warns of AD DS Flaw

Subscribe to our newsletter

    Latest Incidents

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    Nexar Dashcam Database Breached

    Wealthsimple Platform Data Breach

    Cornwell Tools Data Breach Hits 104k

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial