Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads

Posted on May 13, 2025May 13, 2025 By CWS

Might 13, 2025Ravie LakshmananSupply Chain Assault / Blockchain
Cybersecurity researchers have found a malicious bundle on the Python Bundle Index (PyPI) repository that purports to be an utility associated to the Solana blockchain, however comprises malicious performance to steal supply code and developer secrets and techniques.
The bundle, named solana-token, is not out there for obtain from PyPI, however not earlier than it was downloaded 761 instances. It was first printed to PyPI in early April 2024, albeit with a wholly completely different model numbering scheme.
“When put in, the malicious bundle makes an attempt to exfiltrate supply code and developer secrets and techniques from the developer’s machine to a hard-coded IP tackle,” ReversingLabs researcher Karlo Zanki stated in a report shared with The Hacker Information.

Particularly, the bundle is designed to repeat and exfiltrate the supply code contained in all of the information within the Python execution stack below the guise of a blockchain perform named “register_node().”
This uncommon conduct means that the attackers need to exfiltrate delicate crypto-related secrets and techniques that could be hard-coded within the early levels of writing a program incorporating the malicious perform in query.
It is believed that builders trying to create their very own blockchains have been the probably targets of the menace actors behind the bundle. This evaluation relies on the bundle identify and the capabilities constructed into it.

The precise methodology by which the bundle might have been distributed to customers is presently not recognized, though it is prone to have been promoted on developer-focused platforms.
If something, the invention underscores the truth that cryptocurrency continues to be one of the common targets for provide chain menace actors, necessitating that builders take steps to scrutinize each bundle earlier than utilizing it.
“Improvement groups have to aggressively monitor for suspicious exercise or unexplained adjustments inside each open supply and industrial, third-party software program modules,” Zanki stated. “By stopping malicious code earlier than it’s allowed to penetrate safe improvement environments, groups can stop the sort of harmful provide chain assaults.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Code, Downloads, Malicious, Package, Posing, PyPI, Solana, Source, Stole, Tool

Post navigation

Previous Post: Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments
Next Post: China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

Related Posts

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks The Hacker News
North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The Hacker News
Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users The Hacker News
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros The Hacker News
Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark