Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Maternal PFAS levels are linked to children’s brain development

Amazon DNS outage destroys large portions of the Internet

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious peepy package stealing source code that stole Solana Tools with 761 download
Identity

Malicious peepy package stealing source code that stole Solana Tools with 761 download

userBy userMay 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 13, 2025Ravi LakshmananSupply Chain Attack/Blockchain

Malicious Pypi Packages

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PYPI) repository that claims to be an application related to the Solana blockchain, but contains malicious features to steal source code and developer secrets.

A package named Solana-Token is no longer available for download from Pypi, but not before downloading 761 times. Despite having a completely different version of the numbering scheme, it was first published on Pypi in early April 2024.

“When installed, malicious packages try to exclude source code and developer secrets from developer’s machine into hard-coded IP addresses,” said Karlo Zanki, a researcher at ReversingLabs, in a report shared with Hacker News.

Cybersecurity

In particular, this package is designed to copy and exclude source code contained in all files in the Python execution stack, spoofing a blockchain function named “Register_Node()”.

This anomalous behavior suggests that the attacker is trying to remove sensitive cryptography-related secrets that could be hardcoded early on in creating a program that incorporates the malicious feature in question.

It is believed that developers looking to create their own blockchain are likely to be the target of the threat actors behind the package. This evaluation is based on the package name and the functions it incorporates.

Malicious Pypi Packages

The exact way that a package could have been distributed to users is currently unknown, but it may be advertised on a developer-centric platform.

If anything, this finding highlights the fact that cryptocurrencies continue to be one of the most popular goals for supply chain threat actors, so steps need to be taken to scrutinize all packages before they can be used by developers.

“Development teams should actively monitor suspicious activity or unexplained changes in both open source and commercial third-party software modules,” Zanki said. “By stopping malicious code before it penetrates a safe development environment, teams can prevent destructive supply chain attack types.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMadrid-based startup shaker lands 14 million euros to expand its AI-driven platform for high-tech freelancers in Europe
Next Article The Journey Behind the First FF15 Mentoring Award
user
  • Website

Related Posts

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

October 20, 2025

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

October 20, 2025

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Maternal PFAS levels are linked to children’s brain development

Amazon DNS outage destroys large portions of the Internet

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

£20m science and technology boost supports regional innovation

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.