-= Per source details. Do not edit below this line.=-
Malicious Typosquatting packages campaign targeting developers, steals cloud service credentials
Attack targeted at users of Alibaba, AWS and Telegram via malicious packages published to PyPI.
The malicious code was hidden in strategicly chosen functions and would only trigger when these functions were called. The malicious code does not automatically run on install or import, helping the packages evade detection.
{ "iocs": { "urls": [ "http://119.8.26.163:58888/p/b66886/os11/", "https://api.aliyun-sdk-requests.xyz/tencent", "https://tg.aliyun-sdk-requests.xyz/telegram", "https://api.aliyun-sdk-requests.xyz/aws", "https://api.aliyun-sdk-requests.xyz/aliyun" ], "ips": [ "119.8.26.163" ] }, "malicious-packages-origins": [ { "sha256": "17af179e4e4c480da72b929fd55055b95fc141dbd860450e9553e70a296166aa", "import_time": "2023-10-13T03:24:19.532005023Z", "source": "google-open-source-security", "ranges": [ { "events": [ { "introduced": "0" } ], "type": "ECOSYSTEM" } ], "modified_time": "2023-10-13T03:23:13Z" }, { "sha256": "644686188e6f43d2dc595074d7644cba060e6a91b8de18713f4b551a76a6c3b7", "import_time": "2023-10-15T12:42:01.629261614Z", "source": "checkmarx", "ranges": [ { "events": [ { "introduced": "0" } ], "type": "ECOSYSTEM" } ], "modified_time": "2023-10-15T10:12:58Z" } ] }