We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Malicious Python Packages Downloaded 75k Times

Malicious Python Packages Downloaded 75k Times
Husain Parvez Published on 11th October 2023 Cybersecurity Researcher

A malicious campaign targeting open-source platforms has been discovered, with hundreds of info-stealing Python packages found hiding within these repositories. These packages have been downloaded approximately 75,000 times and pose a significant threat to users.

According to a report by Checkmarx's Supply Chain Security team, the campaign has been active since early April and has been under active observation and monitoring by their researchers since. In their efforts, they discovered 272 packages with code specifically designed to steal sensitive data from targeted systems. Yehuda Gelb, a security researcher at Checkmarx, stated "the sheer volume and persistence of these deployments hinted at an attacker with a well-crafted agenda".

The malware has shown a steady evolution in its sophistication, transitioning from simple plaintext code to multilayered obfuscation. Furthermore, the malware targets a wide range of information, including Wi-Fi passwords, credentials, browsing history, and data from cryptocurrency wallet apps.

It also gathers information on the various antivirus tools that may be present on a victim’s system. In August 2023, the malware evolved to be able to shut off such defense systems on a compromised device.

That being said, one of the most concerning aspects of this malware is its ability to monitor the victim’s clipboard for cryptocurrency addresses, swapping them with the attacker’s address to divert payments. This tactic has proven lucrative for the attackers, who have stolen approximately $100,000 in cryptocurrency. Upon command, the malware can also take screenshots from the compromised system and steal files from the Desktop, Pictures, Documents, Music, Videos, and Downloads directories.

Open-source Python repositories, given their popularity, have become prime targets for hackers. The discovery of this malicious campaign underscores the vulnerabilities present in open-source platforms. Users are advised to exercise caution — scrutinize Python packages before you download them and ensure they come from a trusted source.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address