Article Details

Scrape Timestamp (UTC): 2025-03-15 05:59:04.073

Source: https://thehackernews.com/2025/03/malicious-pypi-packages-stole-cloud.html

Original Article Text

Click to Toggle View

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal. Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as "time" related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them. The packages have been cumulatively downloaded over 14,100 times - While the first set relates to packages that are used to upload data to the threat actor's infrastructure, the second cluster consists of packages implementing cloud client functionalities for several services like Alibaba Cloud, Amazon Web Services, and Tencent Cloud. But they have also been using "time" related packages to exfiltrate cloud secrets. All the identified packages have already been removed from PyPI as of writing. Further analysis has revealed that three of the packages, acloud-client, enumer-iam, and tcloud-python-test, has been listed as dependencies of a relatively popular GitHub project named accesskey_tools that has been forked 42 times and started 519 times. A source code commit referencing tcloud-python-test was made on November 8, 2023, indicating that the package has been available for download on PyPI since then. The package has been downloaded 793 times to date, per statistics from pepy.tech. The disclosure comes as Fortinet FortiGuard Labs said it discovered thousands of packages across PyPI and npm, some of which have been found to embed suspicious install scripts designed to deploy malicious code during installation or communicate with external servers. "Suspicious URLs are a key indicator of potentially malicious packages, as they are often used to download additional payloads or establish communication with command-and-control (C&C) servers, giving attackers control over infected systems," Jenna Wang said. "In 974 packages, such URLs are linked to the risk of data exfiltration, further malware downloads, and other malicious actions. It is crucial to scrutinize and monitor external URLs in package dependencies to prevent exploitation."

Daily Brief Summary

CYBERCRIME // Over 14,000 Downloads of Malicious PyPI Packages Stealing Cloud Tokens

Cybersecurity researchers uncovered a campaign targeting Python Package Index (PyPI) users with disguised libraries designed to steal cloud access tokens.

The malicious packages, which appeared to be time-related utilities, were downloaded over 14,100 times before removal.

Software supply chain security firm ReversingLabs identified 20 harmful packages split into two sets; one for data upload to attackers' infrastructure, and another implementing cloud client functionalities.

Prominent cloud platforms affected include Alibaba Cloud, Amazon Web Services, and Tencent Cloud.

Three specific harmful packages were linked as dependencies in a GitHub project called 'accesskey_tools', which has significant user engagement.

A commit on November 8, 2023, to the 'accesskey_tools' GitHub project referenced one of these malicious packages, ensuring its availability on PyPI since then.

Fortinet FortiGuard Labs reported finding thousands of similar malicious packages across both PyPI and npm, emphasizing the prevalence and risk of such cyber threats.