Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malicious Python Packages on Pypi Uploaded 39 000+
Global Security

Malicious Python Packages on Pypi Uploaded 39 000+

AdminBy AdminApril 5, 2025No Comments3 Mins Read
Malicious Python Packages on PyPI
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


05 April 2025Red LakshmananAttacking Malicious Programs / Chain Supplies

Malicious Python packages on Pypi

Cybersecurity researchers have discovered malicious libraries in Python Package (PYPI) storage facilities designed for confidential information.

Two packages, Bitcoinlibdbfix and Bitcoinlib-Dev, masquerade as fixes for Recent problems discovered in the legal Python module called Bitcoinlib, according to Reversinglabs. The third package detected According to Socket, Sursya, contained a fully automated card -oriented script scenario.

The packages attracted hundreds of downloads before they were lifted, according to statistics from pepy.tech –

“The malicious libraries are trying to attack a similar attack by re -recording the CLI CLI legal team, which tries to highlight tangible database files,” said Reversinglabs.

Cybersecurity

In an interesting turn, the authors of the fake libraries are said to have joined the discussion of the GITHUB release and unsuccessfully tried to deceive anything uninhabited users in the loading and management of the library.

On the other hand, Sursya was openly angry without making efforts to hide your map and credit card features.

“The harmful useful load was introduced in the version 7.36.9, and all subsequent versions had the same built -in logic of the attack,” the research group on the socket said.

Cardalso called Credit card fillingrefers to the automated fraud form with the payment, in which the fraud checks the volume list of stolen credit or debit map with respect to the seller’s payment process for checking the violated or stolen card details. It falls into a wider category of attacks, called automated transaction abuse.

A typical source for stolen credit card data is Carding ForumWhere credit card data was recorded from the victims using different methods such as phishing, skins or theft of malware advertised for sale to other threatening subjects to further criminal activity.

Once they are active (ie, it was not reported, stolen and deactivated), scammers use them to buy gift cards or pre -paid cards, which are then reserved. The actors of the threat also, as we know, check whether the cards are acting, trying small transactions on e -commerce sites to avoid the cardholders are indicated for fraud.

The Rogue package, defined by Socket, designed to check the stolen credit card information, in particular, aimed at merchants using WooCommerce with Cybersource as a payment gateway.

The script reaches this by imitation of legal trading activity, software search for the product, adding it to the basket, moving to the WooCommerce page and filling the payment form with randomized details of accounts and stolen credit card data.

Cybersecurity

Their imitation of the real process of registration is to check the validity of the robbed cards and highlight the relevant parts such as credit card number, shelf life and CVV, on the external server under the control of the attacker (“Railgunmisaka.” Com “) without drawing attention to the fraud detection systems.

“Although the name can lift the eyebrows for carriers (” SurraSya “, the Filipin Slang for” disaster “or” crash “), this is apt characteristic of the package that performs a multi-stage process, imitating the legitimate journey of buyers through the online store, to check stolen credit cards against the real frames.”

“Having built this logic into a Python package published on Pypi and loaded more than 34,000 times, the attacker has created a modular tool that can be easily used in large automation, which made Surgasya a powerful map utilities disguised as a harmless library.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.