• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malicious python packages on pypi downloaded 39,000+ times, steal sensitive

Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data

You are here: Home / General Cyber Security News / Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
April 5, 2025

Cybersecurity researchers have uncovered malicious libraries in the Python Package Index (PyPI) repository that are designed to steal sensitive information.

Two of the packages, bitcoinlibdbfix and bitcoinlib-dev, masquerade as fixes for recent issues detected in a legitimate Python module called bitcoinlib, according to ReversingLabs. A third package discovered by Socket, disgrasya, contained a fully automated carding script targeting WooCommerce stores.

The packages attracted hundreds of downloads before being taken down, according to statistics from pepy.tech –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • bitcoinlibdbfix – 1,101 downloads
  • bitcoinlib-dev – 735 downloads
  • disgrasya – 37,217 downloads

“The malicious libraries both attempt a similar attack, overwriting the legitimate ‘clw cli’ command with malicious code that attempts to exfiltrate sensitive database files,” ReversingLabs said.

Cybersecurity

In an interesting twist, the authors of the counterfeit libraries are said to have joined a GitHub issue discussion and unsuccessfully attempted to trick unsuspecting users into downloading the purported fix and running the library.

On the other hand, disgrasya has been found to be openly malicious, making no effort to conceal its carding and credit card information stealing functionality.

“The malicious payload was introduced in version 7.36.9, and all subsequent versions carried the same embedded attack logic,” the Socket Research Team said.

Carding, also called credit card stuffing, refers to an automated form of payment fraud in which fraudsters test a bulk list of stolen credit or debit card information against a merchant’s payment processing system to verify breached or stolen card details. It falls under a broader attack category referred to as automated transaction abuse.

A typical source for stolen credit card data is a carding forum, where credit card details pilfered from victims using various methods like phishing, skimming, or stealer malware are advertised for sale to other threat actors to further criminal activity.

Once they are found to be active (i.e. not reported lost, stolen, or deactivated), scammers use them to buy gift cards or prepaid cards, which are then resold for profit. Threat actors are also known to test if the cards are valid by attempting small transactions on e-commerce sites to avoid being flagged for fraud by the card owners.

The rogue package identified by Socket is designed to validate stolen credit card information, particularly targeting merchants using WooCommerce with CyberSource as the payment gateway.

The script achieves this by emulating the actions of a legitimate shopping activity, programmatically finding a product, adding it to a cart, navigating to the WooCommerce checkout page, and filling the payment form with randomized billing details and the stolen credit card data.

Cybersecurity

In mimicking a real checkout process, the idea is to test the validity of the plundered cards and exfiltrate the relevant details, such as the credit card number, expiration date, and CVV, to an external server under the attacker’s control (“railgunmisaka[.]com”) without attracting the attention of fraud detection systems.

“While the name might raise eyebrows to native speakers (‘disgrasya’ is Filipino slang for ‘disaster’ or ‘accident’), it’s an apt characterization of a package that executes a multi-step process emulating a legitimate shopper’s journey through an online store in order to test stolen credit cards against real checkout systems without triggering fraud detection,” Socket said.

“By embedding this logic inside a Python package published on PyPI and downloaded over 34,000 times, the attacker created a modular tool that could be easily used in larger automation frameworks, making disgrasya a powerful carding utility disguised as a harmless library.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «spotbugs access token theft identified as root cause of github SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack
Next Post: North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages north korean hackers deploy beavertail malware via 11 malicious npm»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.