Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Trump administration’s massive Intel investment comes from grants already awarded

Push Geoserver Exploits, Polarradege, Gayfemboy Push Cybercrime beyond traditional botnets

Meta partner with Midjourney with AI image and video models

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious peepy package stealing source code that stole Solana Tools with 761 download
Identity

Malicious peepy package stealing source code that stole Solana Tools with 761 download

userBy userMay 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 13, 2025Ravi LakshmananSupply Chain Attack/Blockchain

Malicious Pypi Packages

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PYPI) repository that claims to be an application related to the Solana blockchain, but contains malicious features to steal source code and developer secrets.

A package named Solana-Token is no longer available for download from Pypi, but not before downloading 761 times. Despite having a completely different version of the numbering scheme, it was first published on Pypi in early April 2024.

“When installed, malicious packages try to exclude source code and developer secrets from developer’s machine into hard-coded IP addresses,” said Karlo Zanki, a researcher at ReversingLabs, in a report shared with Hacker News.

Cybersecurity

In particular, this package is designed to copy and exclude source code contained in all files in the Python execution stack, spoofing a blockchain function named “Register_Node()”.

This anomalous behavior suggests that the attacker is trying to remove sensitive cryptography-related secrets that could be hardcoded early on in creating a program that incorporates the malicious feature in question.

It is believed that developers looking to create their own blockchain are likely to be the target of the threat actors behind the package. This evaluation is based on the package name and the functions it incorporates.

Malicious Pypi Packages

The exact way that a package could have been distributed to users is currently unknown, but it may be advertised on a developer-centric platform.

If anything, this finding highlights the fact that cryptocurrencies continue to be one of the most popular goals for supply chain threat actors, so steps need to be taken to scrutinize all packages before they can be used by developers.

“Development teams should actively monitor suspicious activity or unexplained changes in both open source and commercial third-party software modules,” Zanki said. “By stopping malicious code before it penetrates a safe development environment, teams can prevent destructive supply chain attack types.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMadrid-based startup shaker lands 14 million euros to expand its AI-driven platform for high-tech freelancers in Europe
Next Article The Journey Behind the First FF15 Mentoring Award
user
  • Website

Related Posts

Push Geoserver Exploits, Polarradege, Gayfemboy Push Cybercrime beyond traditional botnets

August 23, 2025

Linux malware delivered via malicious RAR filenames avoids antivirus detection

August 22, 2025

Automation is redefineing pentest delivery

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Trump administration’s massive Intel investment comes from grants already awarded

Push Geoserver Exploits, Polarradege, Gayfemboy Push Cybercrime beyond traditional botnets

Meta partner with Midjourney with AI image and video models

Coinbase CEO explains why he fired an engineer who didn’t try AI right away

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.