Malicious PyPI package impersonates SymPy to deploy XMRig miner

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

The Python Package Index (PyPI), a key repository for Python developers, has become a vector for malware distribution. Researchers at The Hacker News reported the discovery of a fake package named "sympy-dev," designed to mimic the legitimate SymPy mathematical library. Upon installation, this package does not provide the expected functionality but instead initiates a stealthy payload.

Specifically, the malware fetches and runs the XMRig miner, a tool commonly used for Monero cryptocurrency mining, on Linux hosts. It employs in-memory execution methods to evade detection by traditional antivirus software, allowing the miner to operate without writing files to disk. This approach minimizes forensic footprints and complicates removal efforts.

Such incidents underscore vulnerabilities in software supply chains, where developers might unwittingly install compromised dependencies. The SymPy library, widely used for symbolic mathematics in scientific computing, serves as an attractive target due to its popularity. No specific victims or widespread impacts were detailed in the report, but the event serves as a reminder for users to verify package authenticity and monitor for unusual system behavior.

Experts recommend scanning dependencies with tools like pip-audit and keeping libraries updated to mitigate these threats. As open-source platforms grow, vigilance against impersonation tactics remains crucial for maintaining trust in the ecosystem.

Mga Kaugnay na Artikulo

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Larawang ginawa ng AI

Malicious npm packages steal developer credentials on multiple platforms

Iniulat ng AI Larawang ginawa ng AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Iniulat ng AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

Iniulat ng AI

Experts have warned that phishing attacks are now appearing in LinkedIn comments. Hackers are exploiting the platform's comment sections to distribute malware. Users are advised to stay vigilant against suspicious links in these interactions.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Iniulat ng AI

Cybersecurity experts are increasingly alarmed by how artificial intelligence is reshaping cybercrime, with tools like deepfakes, AI phishing, and dark large language models enabling even novices to execute advanced scams. These developments pose significant risks to businesses in the coming year. Published insights from TechRadar underscore the scale and sophistication of these emerging threats.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan