top of page
Betterworld Logo

Malicious PyPI Packages Compromise Cloud Security with Over 14,000 Downloads

Writer: John JordanJohn Jordan

Cybersecurity experts have uncovered a malicious campaign involving bogus libraries on the Python Package Index (PyPI) that masquerade as utilities related to time management. These packages, which have been downloaded over 14,100 times, are designed to steal sensitive cloud access tokens from unsuspecting users.

Key Takeaways

  • Malicious Packages: 20 packages identified, posing as time-related utilities.

  • Download Statistics: Over 14,100 downloads before removal from PyPI.

  • Targeted Services: Packages aimed at cloud services like AWS, Alibaba Cloud, and Tencent Cloud.

  • Dependency Risks: Some packages linked to popular GitHub projects, increasing their exposure.

Overview of the Malicious Campaign

The malicious packages were discovered by ReversingLabs, a software supply chain security firm. The identified packages were split into two groups:

  1. Data Upload Packages: These packages were designed to upload data to the attackers' infrastructure.

  2. Cloud Client Functionality Packages: These packages provided functionalities for various cloud services but included hidden features to exfiltrate sensitive data.

The packages included names like , , and , among others. Notably, the package alone accounted for 5,496 downloads, indicating a significant reach before its removal.

Download Statistics

The following is a breakdown of the most downloaded malicious packages:

Package Name
Downloads
acloud-client
5,496
snapshot-photo
2,448
enumer-iam
1,254
credential-python-sdk
1,155
time-check-server
316
time-server-analysis
144
time-service-checker
151
tcloud-python-test
793

Implications for Developers

The discovery of these malicious packages raises significant concerns for developers and organizations relying on open-source libraries. The packages not only pose a risk to individual users but also to larger projects that may inadvertently include these dependencies. For instance, three of the identified packages were dependencies of a popular GitHub project named , which has been forked 42 times and starred 519 times.

Recommendations for Security

Experts recommend that developers take the following precautions to safeguard their projects:

  • Scrutinize Dependencies: Regularly review and audit package dependencies for any suspicious activity or links.

  • Monitor External URLs: Be vigilant about external URLs in package dependencies, as they can lead to data exfiltration or further malware downloads.

  • Stay Informed: Keep abreast of the latest security advisories and updates from trusted sources to mitigate risks associated with supply chain attacks.

Conclusion

The incident involving malicious PyPI packages serves as a stark reminder of the vulnerabilities present in the software supply chain. As the use of open-source libraries continues to grow, so does the need for robust security measures to protect sensitive data from malicious actors. Developers and organizations must remain vigilant and proactive in their approach to software security to prevent similar incidents in the future.

Sources

  • Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal, The Hacker News.

 
 

Join our mailing list

bottom of page