Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Pyronut Package Exploits Telegram Bots via Hidden Backdoor

Pyronut Package Exploits Telegram Bots via Hidden Backdoor

Posted on March 19, 2026 By CWS

A recently identified Python package, known as Pyronut, has been found on the Python Package Index (PyPI) posing a threat to developers of Telegram bots. This package masquerades as the well-known Pyrogram framework, a tool with around 370,000 monthly downloads, making it a lucrative target for cyber impersonation.

Pyronut’s Deceptive Tactics

Unlike typical typosquatting strategies, Pyronut’s creators reproduced Pyrogram’s project details verbatim, forming a malicious clone aimed at social engineering. The GitHub link associated with Pyronut led to a non-existent page, indicating its distribution was through targeted platforms like Telegram communities and developer forums rather than being stumbled upon accidentally.

Endor Labs discovered three iterations of Pyronut—versions 2.0.184, 2.0.185, and 2.0.186—on March 18, 2026, coinciding with their PyPI appearance. Prompt isolation of these versions minimized potential damage, yet developers who utilized the package within this window faced significant risks.

Mechanism of the Pyronut Backdoor

Pyronut’s stealth is attributed to its delayed activation, only executing malicious code when a bot was operational. The package contained a clandestine module in pyrogram/helpers/secret.py, which engaged silently as the Telegram client initialized, bypassing installation-time checks.

Activation of this backdoor provided the attacker with dual Remote Code Execution (RCE) capabilities, allowing arbitrary code execution and shell command execution on the victim’s system. This enabled unauthorized access to sensitive data and possible system control.

Recommendations for Affected Developers

Developers who suspect the use of Pyronut should promptly remove the package and rebuild their development environments from verified sources. It’s critical to rotate all exposed credentials, including API keys and database passwords, and to terminate any active Telegram sessions and revoke associated tokens.

Regular audits of dependency files and the adoption of cryptographic hash pinning in lockfiles are advised to avert silent package substitutions. Implementing the principle of least privilege and integrating Software Composition Analysis into CI/CD pipelines can further safeguard against similar supply chain threats.

Stay informed on cybersecurity developments by following us on Google News, LinkedIn, and X, and consider setting CSN as your preferred source on Google.

Cyber Security News Tags:Backdoor, bot security, Cybersecurity, developer security, Endor Labs, IT security, malicious package, open source security, PyPI, Pyronut, Python, remote code execution, Software Security, supply chain attack, Telegram bots

Post navigation

Previous Post: Marquis Data Breach Impacts 672,000 Individuals
Next Post: Cloaked Secures $375M to Boost Privacy Tools and Enterprise Expansion

Related Posts

UEFI Shell Vulnerabilities Could Allow Hackers to Bypass Secure Boot on 200,000+ Laptops UEFI Shell Vulnerabilities Could Allow Hackers to Bypass Secure Boot on 200,000+ Laptops Cyber Security News
W3 Total Cache Command Injection Vulnerability Exposes 1 Million WordPress Sites to RCE Attacks W3 Total Cache Command Injection Vulnerability Exposes 1 Million WordPress Sites to RCE Attacks Cyber Security News
25 Best Managed Security Service Providers (MSSP) 25 Best Managed Security Service Providers (MSSP) Cyber Security News
Web-to-App Funnels: Pros And Cons Web-to-App Funnels: Pros And Cons Cyber Security News
Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Microsoft Expands DLP for Copilot to Enhance Data Security Microsoft Expands DLP for Copilot to Enhance Data Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in ScreenConnect Addressed by Update
  • Speagle Malware Exploits Security Software for Data Theft
  • Claude AI Flaws Risk Data Theft and Unsafe Redirects
  • 1stProtect Launches with $20M Funding for Security Innovation
  • 54 EDR Killers Exploit Vulnerable Drivers to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in ScreenConnect Addressed by Update
  • Speagle Malware Exploits Security Software for Data Theft
  • Claude AI Flaws Risk Data Theft and Unsafe Redirects
  • 1stProtect Launches with $20M Funding for Security Innovation
  • 54 EDR Killers Exploit Vulnerable Drivers to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark