• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Dozens of Malicious ‘HTTP’ Libraries Found on PyPI

You are here: Home / General Cyber Security News / Dozens of Malicious ‘HTTP’ Libraries Found on PyPI
February 23, 2023

ReversingLabs scientists have uncovered a large variety of destructive libraries on the Python Offer Index (PyPI) repository.

According to an advisory published Wednesday by Lucija Valentic, a software program menace researcher at ReversingLabs, most of the learned data files had been malicious packages posing as HTTP libraries.

“The descriptions for these packages, for the most aspect, don’t trace at their destructive intent,” Valentic spelled out. “Some are disguised as true libraries and make flattering comparisons in between their capabilities and those of recognised, authentic HTTP libraries.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In distinct, the ReversingLabs noticed 41 destructive PyPI packages, which the security researchers divided into two forms.

The initially was downloads utilized to supply second-stage malware to compromised units, although the second was data-stealers.

“It is not abnormal for terrible actors to invoke the acronym “HTTP” though naming destructive packages,” Valentic reported. 

She described that developers generally use HTTP libraries to connect with correct APIs for third-party module functionalities.

“This track record helps make HTTP libraries extremely attention-grabbing to malicious actors and to researchers monitoring malicious strategies on the net,” the security researcher wrote.

As for the destructive deals detected by ReversingLabs, Valentic explained they shared different similarities.

“The packages have only a few documents, most with extremely very little information and facts identifying them, compared with legitimate software modules,” she wrote in the advisory.

“The operation and objective contained in these packages are fictitious. The genuine reason of these offers is destructive and not explained.”

A checklist of these malicious offers and in-depth descriptions of some of them is out there in the ReversingLabs advisory.

“Typosquatting attacks on platforms like PyPI, npm, RubyGems and GitHub are common,” Valentic warned.

“Developers really should routinely conduct security assessments of third-party libraries and other dependencies in their code.”

The specialized generate-up will come times after JavaScript developer Jesse Mitchell spotted danger actors uploading more than 15,000 spam deals to the open-supply npm repository.


Some areas of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Hackers Use S1deload Stealer to Target Facebook, YouTube Users
Next Post: Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware hackers using trojanized macos apps to deploy evasive cryptocurrency mining»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.