Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Science may someday discover what faith has always known.


devel / comp.lang.python / PyPi supply chain attack

SubjectAuthor
o PyPi supply chain attackWandere

1
PyPi supply chain attack

<458601@dontemail.com>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=29755&group=comp.lang.python#29755

  copy link   Newsgroups: comp.lang.python
Path: i2pn2.org!i2pn.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: dont@emailme.com (Wandere)
Newsgroups: comp.lang.python
Subject: PyPi supply chain attack
Date: Fri, 29 Mar 2024 06:22:29
Organization: To protect and to server
Message-ID: <458601@dontemail.com>
Injection-Info: paganini.bofh.team; logging-data="350390"; posting-host="FnsOMLxu7Y6cXrzoUdB7vQ.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
X-Notice: Filtered by postfilter v. 0.9.3
 by: Wandere - Fri, 29 Mar 2024 06:22 UTC

pypi halted new users and projects while it fended off supply chain attack
https://arstechnica.com/security/2024/03/pypi-halted-new-users-and-projects-while-it-fended-off-supply-chain-attack/
The malicious code is located within each package's setup.py file, enabling automatic execution upon installation.

In addition, the malicious payload employed a technique where the setup.py file contained obfuscated code that
was encrypted using the Fernet encryption module. When the package was installed, the obfuscated code was automatically
executed, triggering the malicious payload. Upon execution, the malicious code within the setup.py file attempted to retrieve
an additional payload from a remote server. The URL for the payload was dynamically constructed by appending the package
name as a query parameter. The retrieved payload was also encrypted using the Fernet module. Once decrypted, the payload
revealed an extensive info-stealer designed to harvest sensitive information from the victim's machine. The malicious payload
also employed a persistence mechanism to ensure it remained active on the compromised system even after the initial execution."

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor