
Malicious PyPI crypto pay package aiocpa implants infostealer code
The incident demonstrates how machine learning-based threat hunting can help development teams spot threats other tools miss.

The incident demonstrates how machine learning-based threat hunting can help development teams spot threats other tools miss.

Three versions of the popular package were infected and used to spread malicious code that was stealing crypto wallet assets.
.webp&w=3840&q=75)
In a new ConversingLabs podcast, the independent security researcher talks about his early entry into the field — and his latest connected-car research.

RL found the VMConnect campaign continuing with malicious actors posing as recruiters, using packages and the names of financial firms to lure developers.

Malware authors upped their game, using homoglyphs to impersonate a protected NuGet prefix and IL weaving to inject malicious code, RL researchers found.

The history of the package is a lesson in why tracking open source threats is such a challenge — and highlights the value of RL's new Spectra Assure Community.

RL discovered what appeared to be a malicious downloader on PyPI. It turned out to be red teaming — but highlights a growing problem for threat detection.

There is no foolproof method to identify phony developer accounts — but there are telltale signs. Threat researchers share three.

Two newly discovered extensions on the VS Code Marketplace are designed to steal sensitive information, showing that open source attacks are expanding.

Here's what the RL research team knows about the suspicious SqzrFramework480 campaign, which is still available on the NuGet repository.

RL has discovered a campaign using PyPI packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used for wallet recovery.

How to apply YARA rules for threat detection, searching, hunting and more.

RL discovered two malicious packages and a subsequent larger campaign, showing that the approach is an emerging software supply chain attack method.

ReversingLabs researchers found two suspicious npm packages that demonstrate how GitHub is increasingly being used to easily deploy malware in novel ways.

Cross-Platform Threats: Leveraging YARA to Identify BiBi Wiper on Linux and Windows Systems
Get your 14-day free trial of Spectra Assure
Get Free TrialMore about Spectra Assure Free Trial