Python developers beware of fake Crytic-Compilers package on PyPI

June 6, 2024
1 min read




Summary of Hackers Target Python Developers

TLDR:

  • A malicious Python package named crytic-compilers was discovered on PyPI, designed to deliver an information stealer called Lumma.
  • The fake package masqueraded as a legitimate library named crytic-compile, aiming to trick developers into downloading it.

Cybersecurity researchers found that the rogue package was downloaded 441 times before being removed from PyPI. The counterfeit package mirrored the version numbers of the real crytic-compile library to appear legitimate. However, it contained an information stealer called Lumma, which targeted Windows operating systems to fetch additional payloads. This discovery highlighted the growing trend of threat actors targeting Python developers and using open-source registries like PyPI for distributing malware.

In a separate incident, more than 300 WordPress sites were compromised with malicious Google Chrome update pop-ups that led to the deployment of information stealers and remote access trojans. Hackers gained access to site interfaces and used a legitimate WordPress plugin called Hustle to display the fake update pop-ups, evading detection by file scanners.

Both incidents underscore the importance of cybersecurity vigilance, especially for developers and website administrators who may be targeted by cybercriminals using sophisticated tactics to infiltrate systems and steal sensitive information.


Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and