• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
this malicious pypi package stole ethereum private keys via polygon

This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

You are here: Home / General Cyber Security News / This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions
March 7, 2025

Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that’s equipped to steal a victim’s Ethereum private keys by impersonating popular libraries.

The package in question is set-utils, which has received 1,077 downloads to date. It’s no longer available for download from the official registry.

“Disguised as a simple utility for Python sets, the package mimics widely used libraries like python-utils (712M+ downloads) and utils (23.5M + downloads),” software supply chain security company Socket said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“This deception tricks unsuspecting developers into installing the compromised package, granting attackers unauthorized access to Ethereum wallets.”

Cybersecurity

The package aims to target Ethereum developers and organizations working with Python-based blockchain applications, particularly Python-based wallet management libraries like eth-account.

Malicious PyPI Package

Besides embedding the attacker’s RSA public key to be used for encrypting the stolen data and an Ethereum sender account under their control, the library hooks into wallet creation functions like “from_key()” and “from_mnewmonic()” to intercept private keys as they are generated on the compromised machine.

In an interesting twist, the private keys are exfiltrated within blockchain transactions via the Polygon RPC endpoint “rpc-amoy.polygon.technology” in an attempt to resist traditional detection efforts that monitor for suspicious HTTP requests.

“This ensures that even when a user successfully creates an Ethereum account, their private key is stolen and transmitted to the attacker,” Socket said. “The malicious function runs in a background thread, making detection even more difficult.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «u.s. secret service seizes russian garantex crypto exchange website U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website
Next Post: What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey what pci dss v4 really means – lessons from a&f»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.