Non Cult Crypto News

Non Cult Crypto News

in

Crypto-stealing malware discovered in Python Package Index — Checkmarx

According to cybersecurity firm Hacken, financial losses from crypto hacks topped $440 million in the third quarter of 2024.

COINTELEGRAPH IN YOUR SOCIAL FEED

Researchers at the Checkmarx cybersecurity firm sounded the alarm on a dangerous form of malware uploaded to the Python Package Index (PyPI) — a platform for Python developers to download and share code — that steals private keys, mnemonic phrases, and other sensitive user data.

According to the firm, the malware was automatically uploaded by a suspicious user in several different software packages meant to mimic decoding applications for popular wallets like MetaMask, Atomic, TronLink, Ronin, and other industry staples.

The malware was cleverly embedded within parts of the software packages. This allowed the malicious software to go largely undetected due to what appeared to be harmless code.

An earlier example of malicious software packages was uploaded to the Python Package Index platform in March 2024. Source: Checkmarx

However, upon closer inspection, specific components of the data allowed the hackers to take control of cryptocurrency wallets and shift funds once the unsuspecting users called specific functions embedded in the software packages.

Researchers at Checkmarx first discovered the attack vector in March 2024, resulting in the platform suspending new projects and new user accounts until the malicious elements were removed — which they eventually were.

Despite the vigilance and quick action of Checkmarx and the Python Package Index to address the issue, the malware returned in early October and has reportedly been downloaded more than 3,700 times since.

Related: Symbiotic X hacked, malware is infecting SVG files: Crypto-Sec

Malware: a modern digital plague

The malware uploaded to the Python developer hub is concerning, but far from unique. In September, cybersecurity firm McAfee Labs discovered sophisticated malware that targeted Android smartphones and could steal private keys by scanning images stored on a phone’s internal memory.

The malware used a technology known as optical character recognition to extract text from images and was primarily spread through text message links, which prompted unsuspecting users to download fraudulent malware applications posing as normal software.

Security specialists at Hewlett-Packard’s Wolf Security team later revealed that cybercriminals were increasingly using artificial intelligence to create malware — a development that significantly lowers the barrier to entry for creating malicious programs.

More recently, in October, more than 28,000 users fell prey to malware disguising itself as office productivity software and gaming applications. Fortunately, the malware only managed to steal a total of $6,000.

Magazine: 2 auditors miss $27M Penpie flaw, Pythia’s ‘claim rewards’ bug: Crypto-Sec

This article first appeared at Cointelegraph.com News

What do you think?

Written by Outside Source

Mt. Gox delays repayment deadline, pushes it to October 2025

SEC again delays decision on spot Ethereum ETF options

Back to Top

Ad Blocker Detected!

We've detected an Ad Blocker on your system. Please consider disabling it for Non Cult Crypto News.

How to disable? Refresh

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

To use social login you have to agree with the storage and handling of your data by this website.

Add to Collection

No Collections

Here you'll find all collections you've created before.