Now follow us on

Latest News

6/recent/ticker-posts

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

Views
https://ift.tt/WLSClJM
Researchers have discovered a number of malicious Python packages in the official third-party software repository that are engineered to exfiltrate AWS credentials and environment variables to a publicly exposed endpoint. The list of packages includes loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils, according to Sonatype security researcher Ax Sharma. The packages and as well as the endpoint have now been taken down. "Some of these packages either contain code that reads and exfiltrates your secrets or use one of the dependencies that will do the job," Sharma  said . The malicious code injected into "loglib-modules" and "pygrata-utils" allow it to harvest AWS credentials, network interface information, and environment variables and export them to a remote endpoint: "hxxp://graph.pygrata[.]com:8000/upload." Troublingly, the endpoints hosting this information in the form of hundreds of .TXT files were not secured by any

from The Hacker News - Cybersecurity News and Analysis https://ift.tt/9mhM702
Researchers have discovered a number of malicious Python packages in the official third-party software repository that are engineered to exfiltrate AWS credentials and environment variables to a publicly exposed endpoint. The list of packages includes loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils, according to Sonatype security researcher Ax Sharma. The packages and as well as the endpoint have now been taken down. "Some of these packages either contain code that reads and exfiltrates your secrets or use one of the dependencies that will do the job," Sharma  said . The malicious code injected into "loglib-modules" and "pygrata-utils" allow it to harvest AWS credentials, network interface information, and environment variables and export them to a remote endpoint: "hxxp://graph.pygrata[.]com:8000/upload." Troublingly, the endpoints hosting this information in the form of hundreds of .TXT files were not secured by any

Post a Comment

1 Comments

  1. Hire one of the greatest ethical hackers of the time and solutions to your hacking needs without losing your head. You can communicate with them with a newly created email address and keep the conversation anonymous, Just like I did when I needed phone spying services. they offer credit repairs services and specialized bitcoin investment scam recovery. Both of these are among the few services offered by these guys. +satoshirecov3ry@gmail+

    ReplyDelete

Loading...

Special Sale

70 % off

Premium cPanel hosting
at best cheap rates.

Buy Now