Malicious PyPI package impersonates SymPy to deploy XMRig miner

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

The Python Package Index (PyPI), a key repository for Python developers, has become a vector for malware distribution. Researchers at The Hacker News reported the discovery of a fake package named "sympy-dev," designed to mimic the legitimate SymPy mathematical library. Upon installation, this package does not provide the expected functionality but instead initiates a stealthy payload.

Specifically, the malware fetches and runs the XMRig miner, a tool commonly used for Monero cryptocurrency mining, on Linux hosts. It employs in-memory execution methods to evade detection by traditional antivirus software, allowing the miner to operate without writing files to disk. This approach minimizes forensic footprints and complicates removal efforts.

Such incidents underscore vulnerabilities in software supply chains, where developers might unwittingly install compromised dependencies. The SymPy library, widely used for symbolic mathematics in scientific computing, serves as an attractive target due to its popularity. No specific victims or widespread impacts were detailed in the report, but the event serves as a reminder for users to verify package authenticity and monitor for unusual system behavior.

Experts recommend scanning dependencies with tools like pip-audit and keeping libraries updated to mitigate these threats. As open-source platforms grow, vigilance against impersonation tactics remains crucial for maintaining trust in the ecosystem.

Makala yanayohusiana

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Picha iliyoundwa na AI

Malicious npm packages steal developer credentials on multiple platforms

Imeripotiwa na AI Picha iliyoundwa na AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Imeripotiwa na AI

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

IBM's artificial intelligence tool, known as Bob, has been found susceptible to manipulation that could lead to downloading and executing malware. Researchers highlight its vulnerability to indirect prompt injection attacks. The findings were reported by TechRadar on January 9, 2026.

Imeripotiwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Imeripotiwa na AI

Google's Gemini AI is generating subpar code for a new helper script aimed at Ubuntu development. The tool, highlighted by Phoronix, has raised concerns over its reliability in producing clean, functional Linux code. Developers are advised to review outputs carefully.

Alhamisi, 19. Mwezi wa tatu 2026, 22:25:31

Duet Night Abyss launcher spreads malware on Steam

Jumatano, 18. Mwezi wa tatu 2026, 03:20:19

Infostealers Disguised as Claude Code, OpenClaw, and Other AI Tools

Jumatatu, 9. Mwezi wa tatu 2026, 15:31:11

Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Alhamisi, 19. Mwezi wa pili 2026, 13:36:25

Researchers uncover new SysUpdate malware variant targeting Linux

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Jumatano, 11. Mwezi wa pili 2026, 00:43:36

Researchers discover SSHStalker botnet infecting Linux servers

Ijumaa, 30. Mwezi wa kwanza 2026, 21:23:53

Researchers uncover ShadowHS Linux exploitation framework

Jumatano, 21. Mwezi wa kwanza 2026, 17:17:18

Attackers hijack Linux Snap Store apps to steal crypto phrases

Jumanne, 16. Mwezi wa kumi na mbili 2025, 12:38:54

Compromised IAM credentials drive AWS crypto mining campaign

Jumatano, 5. Mwezi wa kumi na moja 2025, 22:25:46

Russian hackers use Linux VMs to hide malware on Windows

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa