Credit card-stealing malware found in official Python repository
Security researchers blame the repository’s lack of moderation
Cybersecurity researchers have once again found malicious packages lurking in Python’s official repository, PyPI.
According to estimates from the security research team at DevOps specialists JFrog, the eight malicious Python packages were downloaded more than 30,000 times.
The researchers’ analysis reveals that the tainted packages are designed to sniff out credit card information that’s usually auto-saved by some popular web browsers including Chrome and Edge.
- These are the best endpoint protection tools
- Shield yourself with these best identity theft protection services
- Also take a look at the best laptops for programming
“The continued discovery of malicious software packages in popular repositories like PyPI is an alarming trend that can lead to widespread supply chain attacks. The ability for attackers to use simple obfuscation techniques to introduce malware means developers have to be concerned and vigilant,” observed Asaf Karas, CTO, Security at JFrog.
Checks and controls
PyPI has purged the packages after being alerted by JFrog.
According to the JFrog, in addition to siphoning credit card details, the packages also scraped tokens of the Discord messaging platform, which could be used to impersonate the user.
PyPI has been at the receiving end of several campaigns to poison the repository with malicious packages. Earlier this year in June, PyPI was purged of half a dozen typosquatting packages that contained cryptomining malware, and a month before that the repository was flooded with spam packages.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
In fact, a recent study revealed that almost half of the packages in PyPI have one or more security issues.
The researchers believe a lack of moderation and automated security controls in PyPI and other public software repositories makes it fairly straightforward for threat actors to inject malicious code.
JFrog suggests that developers must integrate preventive measures such as verification of library signatures in their CI/CD pipelines, along with tools that scan for suspicious code.
“This is a systemic threat, and it needs to be actively addressed on several layers, both by the maintainers of software repositories and by the developers,” believes Karas.
- Protect your devices with these best antivirus software
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.