PyPI suspends new user registration to block malware campaign

PyPI suspends new user registration to block malware campaign

March 28, 2024 at 02:04PM

PyPI, the Python Package Index, has suspended user registrations and new project creation due to an ongoing malware campaign. Threat actors are uploading fake packages to compromise developers, with the latest report from Checkmarx revealing 365 malicious entries and an info-stealer payload. This emphasizes the importance of rigorously verifying open-source components.

From the meeting notes, it is clear that the Python Package Index (PyPI) has taken measures to address an ongoing malware campaign. As a result, user registration and new project creation have been temporarily suspended. The malware campaign involves threat actors uploading packages with names similar to legitimate projects, containing malicious code aimed at compromising software developers and potentially leading to supply-chain attacks.

The malicious code, encrypted using the Fernet module, attempts to retrieve an additional payload from a remote server and is designed to function as an info-stealer targeting data stored in web browsers. This campaign has led to the suspension of new user registrations to mitigate the malicious activity.

Checkmarx and Check Point have provided reports detailing the nature of the malicious entries and the tactics used by the threat actors. Check Point identified over 500 malicious packages deployed in two stages, with each package originating from unique maintainer accounts. The researchers noted the use of automation in orchestrating the attack, with all entries having the same version number and the names appearing to be generated through a randomization process.

This incident underscores the importance of rigorously verifying the authenticity and security of components used in projects by software developers and package maintainers from open-source repositories. It’s also noted that PyPI has previously taken similar aggressive steps to safeguard its community from malicious submissions.

In summary, the meeting notes reflect the serious impact of the malware campaign on PyPI and emphasize the need for proactive measures to counter such threats in the future.

Full Article