According to estimates from the security research team at DevOps specialists JFrog, the eight malicious Python packages were downloaded more than 30,000 times.
- These are the best endpoint protection tools
- Shield yourself with these best identity theft protection services
- Also take a look at the best laptops for programming
“The continued discovery of malicious software packages in popular repositories like PyPI is an alarming trend that can lead to widespread supply chain attacks. The ability for attackers to use simple obfuscation techniques to introduce malware means developers have to be concerned and vigilant,” observed Asaf Karas, CTO, Security at JFrog.
Checks and controls
PyPI has purged the packages after being alerted by JFrog.
According to the JFrog, in addition to siphoning credit card details, the packages also scraped tokens of the Discord messaging platform, which could be used to impersonate the user.
PyPI has been at the receiving end of several campaigns to poison the repository with malicious packages. Earlier this year in June, PyPI was purged of half a dozen typosquatting packages that contained cryptomining malware, and a month before that the repository was flooded with spam packages.
In fact, a recent study revealed that almost half of the packages in PyPI have one or more security issues.
The researchers believe a lack of moderation and automated security controls in PyPI and other public software repositories makes it fairly straightforward for threat actors to inject malicious code.
JFrog suggests that developers must integrate preventive measures such as verification of library signatures in their CI/CD pipelines, along with tools that scan for suspicious code.
“This is a systemic threat, and it needs to be actively addressed on several layers, both by the maintainers of software repositories and by the developers,” believes Karas.
- Protect your devices with these best antivirus software