Python Panic: Revival Hijack Threatens 22,000 PyPI Packages in New Supply Chain Attack
Hackers are infiltrating organizations with a new supply chain attack called Revival Hijack, targeting the Python Package Index (PyPI). By re-registering removed packages, attackers can spread malicious software. JFrog warns this could affect thousands of packages and urges developers to inspect their DevOps pipelines to avoid compromising their systems.

Hot Take:
Just when you thought your Python packages were your trusty sidekicks, they go and get themselves hijacked. Cue the dramatic music! This “Revival Hijack” sounds more like a zombie apocalypse scenario, where packages come back from the dead to terrorize our DevOps pipelines. Somebody call the code exorcist!
Key Points:
- A new supply chain attack technique called “Revival Hijack” is targeting the PyPI registry.
- JFrog found that 22,000 existing PyPI packages are vulnerable, potentially leading to hundreds of thousands of malicious downloads.
- The technique exploits the re-registration of removed packages, allowing attackers to publish malicious versions.
- JFrog preemptively hijacked vulnerable packages to prevent exploitation, assigning them a version number of 0.0.0.1.
- Thwarting this attack requires vigilance from developers to ensure no removed packages are installed during updates.
Already a member? Log in here