PyPi’s Malicious Package Fiasco: Coffin Conmen Strike Again!

Seven malicious PyPi packages were caught red-handed using Gmail’s SMTP servers for data exfiltration, with one notorious package downloaded over 18,000 times before being removed. These ‘Coffin’ packages impersonated a legitimate package but instead offered covert remote access and cryptocurrency theft. If installed, remove them pronto and change your keys!

Pro Dashboard

Hot Take:

Who knew that PyPi packages could moonlight as cryptographic cat burglars? It seems that even the most innocuous-sounding code libraries have a knack for pulling off a digital heist. But hey, when Gmail’s SMTP server is your partner in crime, who needs a ski mask?

Key Points:

– Seven malicious PyPi packages were discovered using Gmail’s SMTP servers and WebSockets for nefarious deeds.
– These packages lingered on PyPi for up to four years, with one being downloaded over 18,000 times.
– The packages impersonated a legitimate ‘Coffin’ package, aiming at covert remote access and data exfiltration.
– The malware’s antics included email exfiltration, file transfer, and potential cryptocurrency theft.
– A related npm package, ‘crypto-encrypt-ts,’ also targeted cryptocurrency wallets, proving digital pickpocketing is in vogue.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?