Daily Tech News, Interviews, Reviews and Updates

Attackers uploaded dozen malicious Python packages to PyPi repository

In a typosquatting attack this weekend, attackers uploaded a dozen malicious Python packages to the PyPi repository. It performs DDoS attacks on a Counter Strike 1.6 Server. 

The Python Package Index (PyPi) is a repository of open source software packages. Developers can make use of this and incorporate them into their Python projects to easily build complex apps. 

Since the repository is available for anyone’s access and anyone can upload packages unless it is announced malicious, it’s a common hunting site for threat actors. 

Researchers from Checkmarx discovered the typosquatting through unusual activity. They saw that a user with the name “devfather777” published 12 packages with the same name this setting the trap for users to use the malicious version. 

Typosquatting attacks involves the threat actors depending on  the victims to mistakenly click on a malicious package. In the case of the discussed attack, some of the packages and their counterparts were, Gesnim (Gensim), TensorFolw (TensorFlow) etc. 

The 12 packages uploaded by the user were Gesnim, TensorFolw, Kears, Seabron, tqmd, lxlm, mokc, ipaddres, ipadress, falsk,  douctils and inda. 

Since the software developers upload the packages through the terminal, they can easily type the name with a letter in the wrong order. The download and build functions normally and the user doesn’t discover the mistake and infects their device. 

 



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More