Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious peepy package stealing source code that stole Solana Tools with 761 download
Identity

Malicious peepy package stealing source code that stole Solana Tools with 761 download

userBy userMay 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 13, 2025Ravi LakshmananSupply Chain Attack/Blockchain

Malicious Pypi Packages

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PYPI) repository that claims to be an application related to the Solana blockchain, but contains malicious features to steal source code and developer secrets.

A package named Solana-Token is no longer available for download from Pypi, but not before downloading 761 times. Despite having a completely different version of the numbering scheme, it was first published on Pypi in early April 2024.

“When installed, malicious packages try to exclude source code and developer secrets from developer’s machine into hard-coded IP addresses,” said Karlo Zanki, a researcher at ReversingLabs, in a report shared with Hacker News.

Cybersecurity

In particular, this package is designed to copy and exclude source code contained in all files in the Python execution stack, spoofing a blockchain function named “Register_Node()”.

This anomalous behavior suggests that the attacker is trying to remove sensitive cryptography-related secrets that could be hardcoded early on in creating a program that incorporates the malicious feature in question.

It is believed that developers looking to create their own blockchain are likely to be the target of the threat actors behind the package. This evaluation is based on the package name and the functions it incorporates.

Malicious Pypi Packages

The exact way that a package could have been distributed to users is currently unknown, but it may be advertised on a developer-centric platform.

If anything, this finding highlights the fact that cryptocurrencies continue to be one of the most popular goals for supply chain threat actors, so steps need to be taken to scrutinize all packages before they can be used by developers.

“Development teams should actively monitor suspicious activity or unexplained changes in both open source and commercial third-party software modules,” Zanki said. “By stopping malicious code before it penetrates a safe development environment, teams can prevent destructive supply chain attack types.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMadrid-based startup shaker lands 14 million euros to expand its AI-driven platform for high-tech freelancers in Europe
Next Article The Journey Behind the First FF15 Mentoring Award
user
  • Website

Related Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

July 8, 2025

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

July 8, 2025

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Moonvalley’s “ethical” AI video model for filmmakers has been released

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.