Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PyPI Warns Users of Fresh Phishing Campaign

PyPI Warns Users of Fresh Phishing Campaign

Posted on September 25, 2025September 25, 2025 By CWS

The Python Bundle Index (PyPI), the default platform for Python’s package deal administration instruments, is warning customers of a contemporary phishing marketing campaign counting on area confusion to reap credentials.

The assault, a continuation of a marketing campaign performed in July, includes fraudulent messages asking customers to confirm their electronic mail tackle for safety functions, and claiming that accounts could also be suspended attributable to lack of motion.

“This electronic mail is pretend, and the hyperlink goes to pypi-mirror.org which is a website not owned by PyPI or the PSF [Python Software Foundation],” PSF safety developer-in-residence Seth Larson warns.

Organising phishing-resistant multi-factor authentication (MFA), Larson explains, helps PyPI maintainers mitigate the dangers related to phishing assaults.

Those that clicked on the hyperlinks in these emails and shared their credentials on the pretend web site, nonetheless, are suggested to instantly rotate their credentials, verify their account’s safety historical past for anomalies, and report suspicious exercise.

The marketing campaign echoes a current phishing assault focusing on NPM package deal maintainers with emails asking them to replace their MFA info to keep away from account suspension. 

The NPM assault efficiently tricked a number of maintainers, together with Josh Junon (Qix), who maintains 18 packages with over 2.5 billion weekly downloads, leading to dozens of malicious variations of the compromised packages being pushed to the NPM registry.

Over the previous years, menace actors have been noticed more and more focusing on the open supply ecosystem for malware distribution and large-scale provide chain assaults.Commercial. Scroll to proceed studying.

“Risk actors are discovering other ways to steal credentials for cloud accounts important for enterprises to assemble and develop software program for his or her respective prospects. The ways used allow menace actors to determine many extra goal enterprises (prospects) and monetize the compromise in a number of methods,” Saviynt chief belief officer Jim Routh mentioned.

“Enterprises have a possibility to extra successfully handle the chance of the sort of credential compromise via superior authentication strategies, cloud account entry administration strategies, and privileged person administration utilizing steady validation strategies,” Routh added.

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Associated: AI Provide Chain Assault Technique Demonstrated In opposition to Google, Microsoft Merchandise

Associated: Watch on Demand: Provide Chain & Third-Get together Threat Safety Summit

Security Week News Tags:Campaign, Fresh, Phishing, PyPI, Users, Warns

Post navigation

Previous Post: North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers
Next Post: Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection

Related Posts

RapidFort Secures M to Enhance Software Security Automation RapidFort Secures $42M to Enhance Software Security Automation Security Week News
Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices Security Week News
Minnesota Activates National Guard in Response to Cyberattack Minnesota Activates National Guard in Response to Cyberattack Security Week News
Radical Empowerment From Your Leadership: Understood by Few, Essential for All Radical Empowerment From Your Leadership: Understood by Few, Essential for All Security Week News
OpenAI to Help DoD With Cyber Defense Under New 0 Million Contract OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract Security Week News
Shai-Hulud Supply Chain Attack Led to .5 Million Trust Wallet Heist Shai-Hulud Supply Chain Attack Led to $8.5 Million Trust Wallet Heist Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News