Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

Source: The Hacker News
Author: [email protected] (The Hacker News)
URL: https://thehackernews.com/2025/03/malicious-pypi-packages-stole-cloud.html

“`markdown
# ONE SENTENCE SUMMARY:
A malicious campaign targeted PyPI users with fake “time” utilities to steal cloud credentials, affecting thousands of downloads before removal.

# MAIN POINTS:
1. Cybercriminals uploaded 20 malicious Python packages to PyPI, masquerading as “time”-related utilities.
2. These packages were designed to steal sensitive cloud access tokens from affected users.
3. The campaign resulted in over 14,100 downloads before the packages were removed.
4. Some packages uploaded data to threat actor infrastructure, while others mimicked cloud client functionalities.
5. Three packages were dependencies in a popular GitHub project, increasing their reach.
6. A commit referencing a malicious package dates back to November 8, 2023.
7. Fortinet discovered thousands of suspicious packages across PyPI and npm with harmful install scripts.
8. Malicious packages often use external URLs to download payloads or communicate with command-and-control servers.
9. 974 packages were linked to data exfiltration, malware downloads, and other threats.
10. Monitoring external URLs in package dependencies is critical to preventing exploitation.

# TAKEAWAYS:
1. Attackers increasingly exploit software supply chains by injecting malicious packages into trusted repositories.
2. Developers should verify package authenticity before installation to prevent credential theft.
3. Open-source ecosystems remain vulnerable to dependency hijacking and supply chain attacks.
4. Continuous monitoring and scrutiny of external URLs in dependencies are essential for security.
5. Security firms play a vital role in identifying and mitigating emerging threats in package repositories.
“`