Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain

Posted on July 29, 2025July 29, 2025 By CWS

Jul 29, 2025Ravie LakshmananPhishing / Developer Safety
The maintainers of the Python Bundle Index (PyPI) repository have issued a warning about an ongoing phishing assault that is concentrating on customers in an try to redirect them to pretend PyPI websites.
The assault entails sending e-mail messages bearing the topic line “[PyPI] E mail verification” which are despatched from the e-mail tackle noreply@pypj[.]org (observe that the area will not be “pypi[.]org”).
“This isn’t a safety breach of PyPI itself, however somewhat a phishing try that exploits the belief customers have in PyPI,” Mike Fiedler, PyPI Admin, stated in a publish Monday.
The e-mail messages instruct customers to comply with a hyperlink to confirm their e-mail tackle, which ends up in a reproduction phishing web site that impersonates PyPI and is designed to reap their credentials.
However in a intelligent twist, as soon as the login info is entered on the bogus web site, the request is routed to the reputable PyPI web site, successfully fooling the victims into pondering that nothing is amiss when, in actuality, their credentials have been handed on to the attackers. This methodology is more durable to detect as a result of there are not any error messages or failed logins to set off suspicion.

PyPI stated it is taking a look at completely different strategies to deal with the assault. In the mean time, it is urging customers to examine the URL within the browser earlier than signing in and chorus from clicking on the hyperlink if they’ve already acquired such emails.In case you’re uncertain whether or not an e-mail is reputable, a fast verify of the area title—letter by letter—may help. Instruments like browser extensions that spotlight verified URLs or password managers that auto-fill solely on identified domains can add a second layer of protection. These sorts of assaults do not simply trick people; they intention to achieve entry to accounts which will publish or handle broadly used packages.
“When you have already clicked on the hyperlink and offered your credentials, we suggest altering your password on PyPI instantly,” Fiedler stated. “Examine your account’s Safety Historical past for something sudden.”
It is at present not clear who’s behind the marketing campaign, however the exercise bears putting similarities to a current npm phishing assault that employed a typosquatted area “npnjs[.]com” (versus “npmjs[.]com”) to ship comparable e-mail verification emails to seize customers’ credentials.
The assault ended up compromising seven completely different npm packages to ship a malware referred to as Scavenger Stealer to assemble delicate knowledge from internet browsers. In a single case, the assaults paved the best way for a JavaScript payload that captured system info and surroundings variables, and exfiltrated the main points over a WebSocket connection.Related assaults have been seen throughout npm, GitHub, and different ecosystems the place belief and automation play a central position. Typosquatting, impersonation, and reverse proxy phishing are all techniques on this rising class of social engineering that exploits how builders work together with instruments they depend on day by day.

The Hacker News Tags:Campaign, Domain, Emails, Fake, Lookalike, Ongoing, Phishing, PyPI, Verification, Warns

Post navigation

Previous Post: Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time
Next Post: Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets

Related Posts

PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs The Hacker News
Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar The Hacker News
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure The Hacker News
UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit The Hacker News
Entra ID Data Protection: Essential or Overkill? The Hacker News
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark