A new set of destructive Python deals has slithered their way to the Python Package Index (PyPI) repository with the top aim of thieving sensitive information from compromised developer devices.
The offers masquerade as seemingly innocuous obfuscation applications, but harbor a piece of malware called BlazeStealer, Checkmarx explained in a report shared with The Hacker News.
“[BlazeStealer] retrieves an further destructive script from an exterior supply, enabling a Discord bot that gives attackers full handle above the victim’s pc,” security researcher Yehuda Gelb stated.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The marketing campaign, which commenced in January 2023, involves a whole of 8 packages named Pyobftoexe, Pyobfusfile, Pyobfexecute, Pyobfpremium, Pyobflite, Pyobfadvance, Pyobfuse, and pyobfgood, the final of which was published in Oct.
These modules occur with set up.py and init.py information that are built to retrieve a Python script hosted on transfer[.]sh, which will get executed promptly on their set up.
Named BlazeStealer, the malware operates a Discord bot and permits the threat actor to harvest a vast assortment of details, including passwords from web browsers and screenshots, execute arbitrary commands, encrypt information, and deactivate Microsoft Defender Antivirus on the infected host.
What is more, it can render the laptop unusable by ramping up CPU use, inserting a Windows Batch script in the startup listing to shut down the device, and even forcing a blue display of dying (BSoD) mistake.
“It stands to explanation that developers engaged in code obfuscation are possible dealing with useful and sensitive information and facts, and hence, to a hacker, this translates to a focus on well worth pursuing,” Gelb noted.
A the vast majority of downloads associated with the rogue deals originated from the U.S., followed by China, Russia, Ireland, Hong Kong, Croatia, France, and Spain. They were being collectively downloaded 2,438 occasions just before becoming taken down.
“The open-source domain stays a fertile floor for innovation, but it requires caution,” Gelb mentioned. “Builders ought to keep on being vigilant, and vet the packages prior to usage.”
Observed this article appealing? Stick to us on Twitter and LinkedIn to study additional special content we write-up.
Some parts of this article are sourced from:
thehackernews.com