Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

Google doubles AI Phones with Pixel 10 series

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Pypi blocks 1,800 expired domain emails to prevent account acquisitions and supply chain attacks
Identity

Pypi blocks 1,800 expired domain emails to prevent account acquisitions and supply chain attacks

userBy userAugust 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 19, 2025Ravi LakshmananSupply Chain Security

Expired Domain Email

Maintainers of the Python Package Index (PYPI) repository have announced that package managers now check for expired domains to prevent supply chain attacks.

“These changes will improve PYPI’s overall account security attitude and make it difficult for attackers to leverage expired domain names to gain unauthorized access to their accounts,” said Mike Fiedler, Pypi Safety and Security Engineer at Python Software Foundation (PSF).

The latest update is intended to tackle a domain revival attack. This happens when a bad actor buys an expired domain and uses it to control his PYPI account via password reset.

Pypi said it has unconfirmed more than 1,800 email addresses since early June 2025 as soon as the associated domain enters the expiration phase. This is not a foolproof solution, but it can help block important supply chain attack vectors that would otherwise be legal and difficult to detect.

Cybersecurity

Email addresses are tied to domain names, and in turn, left unpaid can leave a significant risk to packages distributed through the open source registry. If these packages have been abandoned for a long time by their respective maintainers, but downstream developers are still in considerable use, the threat is magnified.

PYPI users must verify their email address during the account registration phase. Therefore, make sure that the provided address is valid and accessible. However, this defense layer is effectively neutralised if the domain expires, allowing an attacker to purchase the same domain and initiate a password reset request.

From there, all that a threat actor has to do is follow the steps to access the account under that domain name. The threat posed by an expired domain occurred in 2022. This happened when an unknown attacker retrieved the domain used by the maintainer of the CTX PYPI package, accessed the account, and published the Rogue version to the repository.

Note that the latest safeguards added by PYPI aim to prevent this kind of account takeover (ATO) scenario and “we aim to minimize potential exposure if your email domain expires and you change your hands, regardless of whether your account has 2FA enabled or not.” attacks can only be applied to accounts registered using email addresses with custom domain names.

Identity Security Risk Assessment

Pypi said it uses Fastly’s status API to query the domain’s status every 30 days and mark the corresponding email address when it expires.

Python Package Manager users are recommended to enable two-factor authentication (2FA) and add a second verified email address from another notable domain, such as Gmail or Outlook.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAllianz Life Data Breach Impact 1.1 million customers
Next Article Message from the mirror image of nature in the quantum world
user
  • Website

Related Posts

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

August 20, 2025

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

August 20, 2025

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

August 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

DOM-based extension ClickJacking exposes popular password managers to credentials and data theft

Google doubles AI Phones with Pixel 10 series

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

Thousands of Grok chats are now searchable on Google

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.