Article Details
Scrape Timestamp (UTC): 2025-09-24 13:15:48.750
Original Article Text
Click to Toggle View
PyPI urges users to reset credentials after new phishing attacks. The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset credentials. Accessible at pypi.org, PyPI is the default source for Python's package management tools, hosting hundreds of thousands of packages and providing developers with a centralized platform to distribute third-party software libraries. Python Software Foundation developer Seth Larson said the phishing emails request targets to "verify their email address" for "account maintenance and security procedures," threatening them with account suspensions and redirecting to a phishing landing page at pypi-mirror[.]org. "If you have already clicked on the link and provided your credentials, we recommend changing your password on PyPI immediately," Larson said. "Inspect your account's Security History for anything unexpected. Report suspicious activity, such as potential phishing campaigns against PyPI, to security@pypi.org." The threat actors aim to steal the victims' credentials, which will likely be used in subsequent attacks to compromise Python packages they've published on PyPI with malware or to publish new malicious packages. These attacks are part of a phishing campaign that also used the pypj[.]org domain in July to trick potential victims into logging in to a fake PyPI site. Larson advised PyPI package maintainers to never click on links in emails and to use password managers that auto-fill credentials based on domain names. To further ensure their accounts are protected against hacking attempts, they should also use phishing-resistant two-factor authentication (2FA) methods, such as hardware keys, and share suspicious emails with others before taking action. Users can also help take down these phishing campaigns by reporting domains as malicious and contacting registrars to have the domains removed, to block attackers' attempts to trick other PyPI users. Last week, the Python Software Foundation team also invalidated all PyPI tokens stolen in the GhostAction supply chain attack in early September, confirming that the threat actors had not abused them to publish malware. In March 2024, PyPI also temporarily suspended user registration and new project creation after threat actors published hundreds of malicious packages disguised as legitimate ones. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
The Python Software Foundation has alerted users to phishing attacks using a fake PyPI website to steal credentials, posing a risk to Python package security.
Attackers send emails urging users to verify their email addresses, threatening account suspension, and redirecting them to a fraudulent site.
Compromised credentials could allow attackers to tamper with existing Python packages or introduce new malicious ones on PyPI.
Users are advised to change passwords immediately if credentials were shared and to monitor account security history for irregularities.
PyPI recommends employing password managers and phishing-resistant two-factor authentication, such as hardware keys, to secure accounts.
The Foundation encourages reporting malicious domains to registrars to aid in dismantling phishing operations and protect the developer community.
In response to previous threats, PyPI invalidated stolen tokens from the GhostAction attack to prevent unauthorized package publications.