A malicious package was found on pypi.
Upon visiting the page of the package, we can see it is quite a popular package
After downloading and investigating the source code, we found the following:
Key Findings
- Connection to Pastebin: The package connects to a Pastebin snippet to obtain an encrypted data blob. This use of a benign platform helps avoid detection.
- Decryption: The encrypted blob is decrypted to reveal the malicious host URL.
- Data Exfiltration: The package sends secrets to the malicious host URL
The package provides 2 functions for encryption and decryption.
The third function is a malicious function that sends client secrets to remote host
Below is the full detailed analysis of the obfuscated source code
We can see that the malicious package is sending secrets to the following server:
hxxps://decry.in:2096/check
Make sure to block any interactions with it.
Securing Third-Party Software: Safeguarding with AppGuard
Ensuring the safety of your third-party software libraries is crucial in defending against malicious packages.
Our solution is called AppGuard, which was developed by our Elite R&D team (35 Elite cyber security professionals, including former members of the IDF 8200 unit)
AppGuard provides robust security measures to verify and monitor these libraries, ensuring they are free from vulnerabilities and malicious code. This proactive approach helps maintain the integrity of your software environment and protects against potential threats.
For more information on AppGuard capabilities and how to stay protected, contact us here.