• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Latest Cybersecurity News

Pypi malicious packages take control of developer devices for crypto mining

John Greenwood Posted On June 22, 2021
0



Pypi Malicious Packages

Multiple malicious packages turned developers’ workstations into crypto mining machines using the PyPi repository and involving in Python projects. It is found that all those malicious packages were deployed from one single account and have made developers to download the same by tricking them into it using the usual typo tactics that disguise themselves as legitimate links.

PyPi malicious packages via Bash scripts

It is found that six packages were of malicious intent and had entered into the Python Package Index (PyPI), that includes mplatlib, learninglib, mllearnlib, matplatlib-plus, maratlib, and maratlib1.

The account that had deployed these malicious packages is ‘nedog123’ found by a security researcher Ax Sharma working at Sonatype, gave the details of it in his blog post. After some tracking back and analysis, Sharma found that the script tried to download a Bash script frpm GitHub and its role was to run a cryptominer called ‘Ubqminer’ in the host machine.

It seems there is another variant that uses GPU power to mine the cryptocurrency.

What is the threat behind such malicious acts?

When developers use these codes/scripts into a project they are working on, they will include these crypto miners into their program/application they work on, and this could get into production thus benefiting the cyber criminals with the mining and affecting the recipient/host of the application and the device.

These six packages were detected using Sonatype after scanning the repository, unfortunately these Pypi malicious packages have already recorded 5000 downloads since April and the malicious package named ‘maratlib’ was the top downloaded one among the six counting to 2371. So if you’re a developer and are reading this article, please verify you aren’t a victim of this malicious packages. Also, share this with your developer community.

Share the article with your friends




Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search