7 min read
7 min read

Security researchers have warned that hackers are launching a new campaign specifically aimed at Python developers. The attackers are distributing malicious code packages designed to steal sensitive information, including passwords and authentication tokens.
These packages often look like legitimate Python libraries, tricking developers into downloading them. Once installed, the malware silently collects data and sends it to attacker-controlled servers. The campaign shows how software supply chains remain a high-value target for cybercriminals.

The password-stealing malware is designed to capture login details from web browsers, cloud services, and developer tools. With stolen credentials, attackers can access sensitive accounts, source code repositories, or even company infrastructure.
This creates a domino effect where one compromised developer can put entire organizations at risk. Since many firms rely on Python for critical projects, the campaign poses both personal and enterprise-level security threats.

The attack relies on uploading trojanized Python packages to open-source repositories, where developers frequently search for tools and modules. Many of these packages use names similar to popular libraries, a tactic known as typosquatting.
Developers who mistakenly install them end up running malicious code. The malware is designed to extract credentials from local files, memory, or browsers. By disguising itself as trusted software, it blends seamlessly into the developer workflow until it is too late.

Python’s popularity in data science, machine learning, and web development makes it an attractive target. Millions of developers worldwide rely on its open-source ecosystem, with PyPI hosting hundreds of thousands of packages.
Hackers exploit this openness to insert malicious code where it can spread quickly. By targeting Python users, attackers gain access not just to individual computers but also to projects and systems where these libraries are later deployed.

The Python Package Index (PyPI) has faced repeated security challenges as hackers upload malicious packages disguised as legitimate tools. Despite ongoing monitoring, the sheer scale of submissions makes it difficult to block every malicious upload.
In recent years, several large-scale campaigns have targeted PyPI, highlighting its role as a weak point in the software supply chain. Security experts emphasize that developers must remain cautious when choosing which packages to install.

One of the main tricks used in this campaign is typosquatting. Attackers create packages with names that are nearly identical to popular ones, relying on developers making small typing errors.
For example, switching a single letter or adding an extra character is enough to fool many users. Once installed, the malicious package executes its payload, often without raising suspicion. This simple yet effective tactic remains a common weapon in software supply chain attacks.

The malware hidden in these Python packages focuses on harvesting credentials. It scans local directories, browser databases, and saved session files for usernames and passwords. Some versions even use keylogging to capture input in real time.
By combining multiple techniques, the attackers maximize their chances of stealing valuable data. Stolen information is usually transmitted to remote servers through encrypted channels, making detection more difficult for security tools.

This campaign underscores the broader risks of software supply chain attacks. When attackers compromise a single developer or library, they can potentially infiltrate thousands of downstream projects.
This ripple effect has been seen in past incidents like SolarWinds and Log4j. In the case of Python, malicious packages spread easily because many developers install dependencies without manually inspecting the code. The result is a dangerous entry point for large-scale compromises.

Unlike enterprise IT teams, many developers download packages directly without security oversight. This makes them attractive targets for hackers. By stealing a developer’s credentials or compromising their system, attackers can access company repositories or cloud environments.
Experts warn that developers must now view themselves as part of the cybersecurity perimeter. Training and awareness are critical, since even skilled coders can fall victim to well-crafted malicious packages.

Researchers have outlined several red flags that may indicate a developer has installed a malicious Python package. These include unexpected outbound network traffic, unknown background processes, and sudden credential leaks.
Some malicious libraries also install persistence mechanisms, ensuring they remain active even after removal attempts. Developers are urged to regularly audit their systems, check dependency lists, and monitor for unusual behavior to catch infections early before attackers escalate access.

The open-source community has begun removing malicious packages linked to this campaign. PyPI administrators have also suspended accounts tied to suspicious uploads. However, the recurring nature of these incidents shows the need for stronger defenses.
Some researchers argue that automated scanning tools and tighter package verification are essential to reduce the risk. Developers are encouraged to report suspicious packages quickly so that they can be taken down before spreading widely.

This is not the first time Python developers have been targeted. Previous attacks have planted credential stealers, crypto-miners, and remote access trojans inside PyPI packages. Each incident reinforces the need for vigilance when working with open-source code.
The lesson is clear: convenience cannot come at the expense of security. Developers and companies alike must take supply chain risks seriously, as attackers continue to recycle and refine these tactics.

Experts recommend several steps to safeguard Python projects. These include using virtual environments to isolate dependencies, reviewing code before installation, and preferring well-maintained libraries with strong reputations.
Automated tools that scan for known malicious packages can also reduce risk. Companies should implement internal package repositories to limit reliance on public sources.
By tightening these practices, both individual developers and organizations can lower the chances of falling victim to malicious code.

The password-stealing campaign against Python developers shows how attackers exploit trust and human error. Even skilled programmers are not immune to downloading compromised packages if they look convincing enough.
Raising awareness about typosquatting, malicious uploads, and the dangers of unchecked dependencies is crucial. Security training tailored to developers can make a real difference, ensuring they think twice before installing a package that could expose their projects and credentials.

While no single tool can prevent all attacks, multi-factor authentication (MFA) can help limit the damage. Even if attackers steal passwords, MFA makes it much harder for them to use those credentials to access critical accounts.
Security experts recommend enforcing MFA across developer tools, repositories, and cloud services. Combined with strong password hygiene, this adds an important layer of defense against password-stealing malware like the one hidden in Python packages.
If you still rely on single-factor logins, incidents like these show why your passwords are useless without MFA & 2FA.

The latest campaign targeting Python developers highlights a growing trend of supply chain attacks across the tech industry. As more organizations rely on open-source software, attackers see new opportunities to insert malicious code at the foundation of digital infrastructure.
Combating this threat requires vigilance, better tools, and shared responsibility between developers, platform maintainers, and security teams. The discovery serves as a wake-up call for anyone working with open-source ecosystems today.
What began with open-source compromises is spreading across the digital world. Cyber scammers upgrade tactics with AI, and businesses need to prepare for a new level of risk.
What do you think about this? Let us know in the comments, and don’t forget to leave a like.
Read More From This Brand:
Don’t forget to follow us for more exclusive content right here on MSN.
This slideshow was made with AI assistance and human editing.
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!