• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

“Kekw” Malware in Python Packages Could Steal Data and Hijack Crypto

You are here: Home / General Cyber Security News / “Kekw” Malware in Python Packages Could Steal Data and Hijack Crypto
May 5, 2023

Several destructive Python .whl documents that contains a new variety of malware referred to as “Kekw” have been found on PyPI (Python Package deal Index).

In accordance to new info by Cyble Analysis and Intelligence Labs (CRIL), Kekw malware can steal sensitive facts from infected systems and conduct clipper actions that can hijack cryptocurrency transactions.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Following our investigation, we discovered that the Python deals below scrutiny have been not current in the PyPI repository, indicating that the Python security team experienced taken out the malicious deals,” CRIL wrote in an advisory released on Wednesday.

“Additionally, [we] confirmed with the Python security staff on 02-05-2023 and verified that they took down the destructive deals within 48 hours of them becoming uploaded.”

Due to the fact the packages were being taken down so swiftly, Cyble reported it is not feasible to establish how quite a few people downloaded them.

“Nevertheless, we consider that the effects of the incident could have been minimal,” reads the advisory.

Mike Parkin, a senior technological engineer at Vulcan Cyber, commented on the news, declaring that the packages are a key example of the provide chain attacks that danger actors want presently. He also acknowledged the team functioning the repository for their good response to the problem.

Read extra on provide chain security: CISA Advises FCC Lined List For Risk Administration

“It’s impractical to hope community repositories to do the occupation for you. Although they do a ton, we can anticipate danger actors to retain applying this technique. The obligation for vetting the libraries in use finally falls to the builders,” Parkin included.

John Bambenek, principal danger hunter at Netenrich, commenting a lot more normally, said that while the upside of open-supply software package and libraries is that it swiftly will increase the efficiency and output of software engineering attempts, the downside is that any individual, such as risk actors, can contribute code.

“While these destructive action can be uncovered speedily, it is not like open-source software program attempts have large-scale SOCs defending their efforts from malicious code insertion,” the security skilled included.

Situation in position, just a couple of months back, Sonatype found out a significant range of destructive deals on the npm and PyPI open-supply registries.


Some sections of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «new android malware 'fluhorse' targeting east asian markets with deceptive New Android Malware ‘FluHorse’ Targeting East Asian Markets with Deceptive Tactics
Next Post: North Korean APT Kimsuky Launches Global Spear-Phishing Campaign Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.