Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Fast-Tracks mRNA Vaccine Test for Head and Neck Cancer in the NHS

What are the attackers doing with them?

Rubygems, forced crypto, security changes hit on malicious packages that steal credentials

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Rubygems, forced crypto, security changes hit on malicious packages that steal credentials
Identity

Rubygems, forced crypto, security changes hit on malicious packages that steal credentials

userBy userAugust 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rubygems, Pypi hits malicious packages

A fresh set of 60 malicious packages has been revealed, targeting the Rubygems ecosystem, by equipping them with harmless automation tools to steal credentials from unsuspecting users, as harmless automation tools for social media, blogging, or messaging services.

The activity has been rated active since at least March 2023, according to software supply chain security company Socket. Cumulatively, the gem has been downloaded over 275,000 times.

That said, not all downloads are performed and some of these gems may be downloaded to a single machine, so this diagram may not accurately represent the actual number of compromised systems.

“Threat actors using Aliess Zon, Nowon, Kwonsoonje and Soonje have issued 60 malicious gems disguised as automation tools from Instagram, Twitter/X, Tiktok, WordPress, Telegram, Kakao and Naver.

The identified GEM provided promise features such as bulk posting and engagement, but it has a secret feature to eliminate usernames and passwords to external servers under threat actor control by displaying a simple graphical user interface for entering user credentials.

Cybersecurity

Some gems, such as Njongto_duo and Jongmogtolon, are notable for their focus on financial discussion platforms, and libraries are being sold as tools to sell ticker mentions, inventory narratives, investment-related forums with integrated engagement, and integrated engagement to amplify visibility and manipulate common perceptions.

The server used to receive captured information includes the program[.]com, appspace[.]KR, and MarketingDuo[.]co[.]KR. These domains are known to promote bulk messaging, phone number scraping, and automated social media tools.

Campaign victims could be Grey Hat Marketers who rely on such tools to run spam, search engine optimization (SEO), and engagement campaigns that artificially increase engagement.

“Each gem serves as an infostealer targeting (but not exclusive) windows aimed at Korean users. “The campaign has evolved across multiple aliases and waves of infrastructure, suggesting mature and permanent operations.”

“By embedding credential theft capabilities in GEMS, sold to automation-focused Grey-Hat users, threat actors secretly capture sensitive data while blending into seemingly legitimate activities.”

This development is because GitLab detected multiple type scat packages with a Python package index (PYPI), designed to steal cryptocurrency from both sides’ wallets by hijacking legitimate staking features. Bittensor and Bittensor – The names of the Python libraries that mimic Cli are as follows –

Bittenso (versions 9.9.4 and 9.9.5) Bittenso-Cli Qbittensor Bittenso

“Attackers appear to have a particularly targeted staking operation for calculated reasons,” says the Gitlab Vulnerability Research Team. “By hiding malicious code within a legally-looking staking feature, attackers leveraged both the technical requirements of regular blockchain operations and user psychology.”

Identity Security Risk Assessment

This disclosure follows new restrictions imposed by the Pypi maintainers to secure Python package installers and inspectors from the confusion attacks that result from the implementation of the ZIP parser.

Put another way, Pypi said it would exploit ZIP’s confusion attacks and reject past manual reviews and auto-detection tools to reject “wheels” (just a ZIP archive) that attempt to smuggle past malicious payloads.

“This was done in response to the discovery that popular installer UVs have different extraction behavior for many Python-based installers that use the implementation of the Zip parser provided by the Zipfile Standard Library module,” says Seth Michael Larson of Python Software Foundation (PSF).

Pypi credits Caleb Brown from the Google Open Source Security team and Tim Hatch from Netflix and reported the issue. He also said that it warns users if they publish wheels that do not match the record metadata file that contains zip content.

“After six months of warning on February 1, 2026, Pypi will begin rejecting newly uploaded wheels that do not match the record metadata file that contains ZIP contents,” says Larsen.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAstronomers detect the largest black holes in the universe
Next Article What are the attackers doing with them?
user
  • Website

Related Posts

What are the attackers doing with them?

August 8, 2025

greedybear uses 150+ malicious Firefox wallet extensions to steal $1 million in crypto.

August 8, 2025

Socgholish malware spreads through AD tools. Provides access to Lockbit, Evil Corp and more

August 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Fast-Tracks mRNA Vaccine Test for Head and Neck Cancer in the NHS

What are the attackers doing with them?

Rubygems, forced crypto, security changes hit on malicious packages that steal credentials

Astronomers detect the largest black holes in the universe

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.