Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

A green digital economy can improve health and sustainability

UKSA internship leads young people to space careers

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Rubygems, forced crypto, security changes hit on malicious packages that steal credentials
Identity

Rubygems, forced crypto, security changes hit on malicious packages that steal credentials

userBy userAugust 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rubygems, Pypi hits malicious packages

A fresh set of 60 malicious packages has been revealed, targeting the Rubygems ecosystem, by equipping them with harmless automation tools to steal credentials from unsuspecting users, as harmless automation tools for social media, blogging, or messaging services.

The activity has been rated active since at least March 2023, according to software supply chain security company Socket. Cumulatively, the gem has been downloaded over 275,000 times.

That said, not all downloads are performed and some of these gems may be downloaded to a single machine, so this diagram may not accurately represent the actual number of compromised systems.

“Threat actors using Aliess Zon, Nowon, Kwonsoonje and Soonje have issued 60 malicious gems disguised as automation tools from Instagram, Twitter/X, Tiktok, WordPress, Telegram, Kakao and Naver.

The identified GEM provided promise features such as bulk posting and engagement, but it has a secret feature to eliminate usernames and passwords to external servers under threat actor control by displaying a simple graphical user interface for entering user credentials.

Cybersecurity

Some gems, such as Njongto_duo and Jongmogtolon, are notable for their focus on financial discussion platforms, and libraries are being sold as tools to sell ticker mentions, inventory narratives, investment-related forums with integrated engagement, and integrated engagement to amplify visibility and manipulate common perceptions.

The server used to receive captured information includes the program[.]com, appspace[.]KR, and MarketingDuo[.]co[.]KR. These domains are known to promote bulk messaging, phone number scraping, and automated social media tools.

Campaign victims could be Grey Hat Marketers who rely on such tools to run spam, search engine optimization (SEO), and engagement campaigns that artificially increase engagement.

“Each gem serves as an infostealer targeting (but not exclusive) windows aimed at Korean users. “The campaign has evolved across multiple aliases and waves of infrastructure, suggesting mature and permanent operations.”

“By embedding credential theft capabilities in GEMS, sold to automation-focused Grey-Hat users, threat actors secretly capture sensitive data while blending into seemingly legitimate activities.”

This development is because GitLab detected multiple type scat packages with a Python package index (PYPI), designed to steal cryptocurrency from both sides’ wallets by hijacking legitimate staking features. Bittensor and Bittensor – The names of the Python libraries that mimic Cli are as follows –

Bittenso (versions 9.9.4 and 9.9.5) Bittenso-Cli Qbittensor Bittenso

“Attackers appear to have a particularly targeted staking operation for calculated reasons,” says the Gitlab Vulnerability Research Team. “By hiding malicious code within a legally-looking staking feature, attackers leveraged both the technical requirements of regular blockchain operations and user psychology.”

Identity Security Risk Assessment

This disclosure follows new restrictions imposed by the Pypi maintainers to secure Python package installers and inspectors from the confusion attacks that result from the implementation of the ZIP parser.

Put another way, Pypi said it would exploit ZIP’s confusion attacks and reject past manual reviews and auto-detection tools to reject “wheels” (just a ZIP archive) that attempt to smuggle past malicious payloads.

“This was done in response to the discovery that popular installer UVs have different extraction behavior for many Python-based installers that use the implementation of the Zip parser provided by the Zipfile Standard Library module,” says Seth Michael Larson of Python Software Foundation (PSF).

Pypi credits Caleb Brown from the Google Open Source Security team and Tim Hatch from Netflix and reported the issue. He also said that it warns users if they publish wheels that do not match the record metadata file that contains zip content.

“After six months of warning on February 1, 2026, Pypi will begin rejecting newly uploaded wheels that do not match the record metadata file that contains ZIP contents,” says Larsen.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew solid oxidation fuel cells may speed up green transitions
Next Article What are the attackers doing with them?
user
  • Website

Related Posts

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

February 11, 2026

North Korea-linked UNC1069 uses AI decoys to attack crypto organizations

February 11, 2026

North Korean agents impersonate experts on LinkedIn to infiltrate companies

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A green digital economy can improve health and sustainability

UKSA internship leads young people to space careers

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

North Korea-linked UNC1069 uses AI decoys to attack crypto organizations

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.