• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

“Kekw” Malware in Python Packages Could Steal Data and Hijack Crypto

You are here: Home / Cyber Security News / “Kekw” Malware in Python Packages Could Steal Data and Hijack Crypto

Numerous dangerous Python .whl documents containing a new sort of malware known as “Kekw” have been learned on PyPI (Python Deal Index).

According to new details by Cyble Study and Intelligence Labs (CRIL), Kekw malware can steal delicate information from infected systems and carry out clipper pursuits that can hijack cryptocurrency transactions.

“Following our investigation, we identified that the Python offers underneath scrutiny ended up not present in the PyPI repository, indicating that the Python security crew experienced eradicated the malicious packages,” CRIL wrote in an advisory released on Wednesday.

“Additionally, [we] verified with the Python security staff on 02-05-2023 and confirmed that they took down the destructive offers within 48 hours of them currently being uploaded.”

Mainly because the packages ended up taken down so swiftly, Cyble mentioned it is not attainable to determine how many folks downloaded them.

“Nevertheless, we believe that the effects of the incident might have been small,” reads the advisory.

Mike Parkin, a senior technological engineer at Vulcan Cyber, commented on the information, declaring that the packages are a prime example of the supply chain attacks that risk actors want presently. He also acknowledged the team running the repository for their right response to the problem.

Browse additional on supply chain security: CISA Advises FCC Covered Record For Risk Management

“It’s impractical to expect public repositories to do the occupation for you. Whilst they do a whole lot, we can assume risk actors to hold utilizing this approach. The duty for vetting the libraries in use in the long run falls to the developers,” Parkin extra.

John Bambenek, principal menace hunter at Netenrich, commenting much more typically, stated that although the upside of open-supply computer software and libraries is that it promptly raises the productivity and output of software program engineering endeavours, the draw back is that any person, together with risk actors, can lead code.

“While this sort of malicious action can be uncovered immediately, it is not like open up-source application efforts have substantial-scale SOCs guarding their initiatives from destructive code insertion,” the security expert added.

Circumstance in issue, just a few of months back, Sonatype found out a substantial number of malicious deals on the npm and PyPI open-supply registries.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « New Android Malware ‘FluHorse’ Targeting East Asian Markets with Deceptive Tactics
Next Post: Dallas Police Department Compromised in Ransomware Attack »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.