30s Summary
Cybersecurity company Checkmarx discovered malware on Python developers’ site PyPI, which stole sensitive data and integrated itself into multiple software packages, including digital wallets. Hidden within these packages as seemingly innocuous code, the malware enabled hackers to take over digital wallets and initiate transactions. Despite the detection and removal of the malware by PyPI in March 2024, it reappeared in October and has since been downloaded over 3,700 times. The use of AI in creating such malicious software is steadily increasing, as evident in recent malware attacks.
Full Article
The cybersecurity company Checkmarx has discovered a dangerous malware on PyPI, a site where Python developers share and download code. The malware sneakily takes sensitive data such as private keys and password hints.
This malicious software was automatically sneaked into several software packages by a suspicious user. These packages were supposed to be similar to decoding applications used with popular digital wallets such as MetaMask, Atomic, TronLink, Ronin, and others you might’ve heard of.
This malware managed to stay hidden inside parts of these software packages, appearing as harmless code to the naked eye. However, if you dug a bit deeper, you could see that certain pieces of data within the software allowed hackers to take control of digital wallets and make transactions.
Checkmarx first noticed what was going on in March 2024, leading PyPI to put a hold on new projects and accounts until they got rid of the malware, which indeed they did eventually. Despite Checkmarx and PyPI’s quick action though, it turns out the malware found its way back in October and has been downloaded more than 3,700 times since then.
The malware sneaked onto the PyPI site isn’t the first of its kind, either. Just last month, McAfee Labs found high-tech malware targeting Android smartphones that could swipe private keys from within your photos. They did this using tech that can read text in images, mainly spreading the malware via links sent by text message, tricking people into downloading malware disguised as regular applications.
Hewlett-Packard’s Wolf Security team later shared that cybercriminals were using artificial intelligence more and more to create this type of malicious software, making it even easier for them to do so.
Just a few weeks ago in October, over 28,000 users were tricked into downloading malware presented as office software and gaming apps. The good news is that they only pocketed about $6,000 this time.
Source: Cointelegraph