Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pypi blocks 1,800 expired domain emails to prevent account acquisitions and supply chain attacks
Identity

Pypi blocks 1,800 expired domain emails to prevent account acquisitions and supply chain attacks

userBy userAugust 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananSupply Chain Security

Expired Domain Email

Maintainers of the Python Package Index (PYPI) repository have announced that package managers now check for expired domains to prevent supply chain attacks.

“These changes will improve PYPI’s overall account security attitude and make it difficult for attackers to leverage expired domain names to gain unauthorized access to their accounts,” said Mike Fiedler, Pypi Safety and Security Engineer at Python Software Foundation (PSF).

The latest update is intended to tackle a domain revival attack. This happens when a bad actor buys an expired domain and uses it to control his PYPI account via password reset.

Pypi said it has unconfirmed more than 1,800 email addresses since early June 2025 as soon as the associated domain enters the expiration phase. This is not a foolproof solution, but it can help block important supply chain attack vectors that would otherwise be legal and difficult to detect.

Cybersecurity

Email addresses are tied to domain names, and in turn, left unpaid can leave a significant risk to packages distributed through the open source registry. If these packages have been abandoned for a long time by their respective maintainers, but downstream developers are still in considerable use, the threat is magnified.

PYPI users must verify their email address during the account registration phase. Therefore, make sure that the provided address is valid and accessible. However, this defense layer is effectively neutralised if the domain expires, allowing an attacker to purchase the same domain and initiate a password reset request.

From there, all that a threat actor has to do is follow the steps to access the account under that domain name. The threat posed by an expired domain occurred in 2022. This happened when an unknown attacker retrieved the domain used by the maintainer of the CTX PYPI package, accessed the account, and published the Rogue version to the repository.

Note that the latest safeguards added by PYPI aim to prevent this kind of account takeover (ATO) scenario and “we aim to minimize potential exposure if your email domain expires and you change your hands, regardless of whether your account has 2FA enabled or not.” attacks can only be applied to accounts registered using email addresses with custom domain names.

Identity Security Risk Assessment

Pypi said it uses Fastly’s status API to query the domain’s status every 30 days and mark the corresponding email address when it expires.

Python Package Manager users are recommended to enable two-factor authentication (2FA) and add a second verified email address from another notable domain, such as Gmail or Outlook.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAllianz Life Data Breach Impact 1.1 million customers
Next Article Message from the mirror image of nature in the quantum world
user
  • Website

Related Posts

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026

Reynolds ransomware embeds BYOVD drivers that disable EDR security tools

February 10, 2026

Inside the rise of the digital parasite

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

VC Marcia Butcher, an associate of Epstein and founder of Day One, explains it herself.

Google sends student journalists’ personal and financial information to ICE

Almost half of xAI’s founding team has now left the company.

North Korean agents impersonate experts on LinkedIn to infiltrate companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.