"Python Packages For PyPI Were Found Emailing Unprotected Websites Using Stolen AWS Keys"

Many malicious Python programs have been discovered in the PyPI repository, which steal sensitive data such as AWS credentials and send it to publicly accessible locations. Software developers can select the building blocks for their Python-based applications or share their work with the community through PyPI, an open-source package repository. PyPI usually responds quickly to reports of malicious packages on the platform, but because there is no actual filtering before submission, dangerous packages may remain on the platform for some time. Sonatype, a software supply-chain security firm, was able to identify packages as dangerous in this instance using sophisticated automated malware detection methods. These packages include loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils. All five packages share code connections or similarities, even if the first two attempt to imitate reputable and well-known projects on PyPI in order to trick unsuspecting or inexperienced users into installing them. The programs "loglib-modules" and "pygrata-utils," according to Sonatype analysts J. Cardona and C. Fernandez, were designed to steal environment variables, AWS login credentials, and network interface data. This article continues to discuss the discovery of malicious Python programs in the PyPI repository. 

CyberIntelMag reports "Python Packages For PyPI Were Found Emailing Unprotected Websites Using Stolen AWS Keys"

 

Submitted by Anonymous on