Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

Posted on August 8, 2025August 8, 2025 By CWS

A recent set of 60 malicious packages has been uncovered focusing on the RubyGems ecosystem by posing as seemingly innocuous automation instruments for social media, running a blog, or messaging providers to steal credentials from unsuspecting customers.
The exercise is assessed to be energetic since at the very least March 2023, in response to the software program provide chain safety firm Socket. Cumulatively, the gems have been downloaded greater than 275,000 occasions.
That mentioned, it bears noting that the determine might not precisely symbolize the precise variety of compromised programs, as not each obtain leads to execution, and it is doable a number of of those gems have been downloaded to a single machine.
“Since at the very least March 2023, a menace actor utilizing the aliases zon, nowon, kwonsoonje, and soonje has revealed 60 malicious gems posing as automation instruments for Instagram, Twitter/X, TikTok, WordPress, Telegram, Kakao, and Naver,” safety researcher Kirill Boychenko mentioned.
Whereas the recognized gems supplied the promised performance, akin to bulk posting or engagement, additionally they harbored covert performance to exfiltrate usernames and passwords to an exterior server underneath the menace actor’s management by displaying a easy graphical person interface to enter customers’ credentials.

A few of the gems, akin to njongto_duo and jongmogtolon, are notable for specializing in monetary dialogue platforms, with the libraries marketed as instruments to flood investment-related boards with ticker mentions, inventory narratives, and artificial engagement to amplify visibility and manipulate public notion.
The servers which can be used to obtain the captured data embody programzon[.]com, appspace[.]kr, and marketingduo[.]co[.]kr. These domains have been discovered to promote bulk messaging, telephone quantity scraping, and automatic social media instruments.
Victims of the marketing campaign are more likely to be grey-hat entrepreneurs who depend on such instruments to run spam, search engine marketing (search engine optimization), and engagement campaigns that artificially increase engagement.
“Every gem capabilities as a Home windows-targeting infostealer, primarily (however not completely) aimed toward South Korean customers, as evidenced by Korean-language UIs and exfiltration to .kr domains,” Socket mentioned. “The marketing campaign developed throughout a number of aliases and infrastructure waves, suggesting a mature and chronic operation.”

“By embedding credential theft performance inside gems marketed to automation-focused grey-hat customers, the menace actor covertly captures delicate knowledge whereas mixing into exercise that seems professional.”
The event comes as GitLab detected a number of typosquatting packages on the Python Package deal Index (PyPI) which can be designed to steal cryptocurrency from Bittensor wallets by hijacking the professional staking capabilities. The names of the Python libraries, which mimic bittensor and bittensor-cli, are beneath –

bitensor (variations 9.9.4 and 9.9.5)
bittenso-cli
qbittensor
bittenso

“The attackers seem to have particularly focused staking operations for calculated causes,” GitLab’s Vulnerability Analysis crew mentioned. “By hiding malicious code inside legitimate-looking staking performance, the attackers exploited each the technical necessities and person psychology of routine blockchain operations.”

The disclosure additionally follows new restrictions imposed by PyPI maintainers to safe Python package deal installers and inspectors from confusion assaults arising from ZIP parser implementations.
Put in a different way, PyPI mentioned it is going to reject Python packages “wheels” (that are nothing however ZIP archives) that try to use ZIP confusion assaults and smuggle malicious payloads previous handbook critiques and automatic detection instruments.
“This has been performed in response to the invention that the favored installer uv has a special extraction conduct to many Python-based installers that use the ZIP parser implementation supplied by the zipfile customary library module,” the Python Software program Basis’s (PSF) Seth Michael Larson mentioned.
PyPI credited Caleb Brown from the Google Open Supply Safety Group and Tim Hatch from Netflix for reporting the problem. It additionally mentioned it is going to warn customers after they publish wheels whose ZIP contents do not match the included RECORD metadata file.
“After 6 months of warnings, on February 1st, 2026, PyPI will start rejecting newly uploaded wheels whose ZIP contents do not match the included RECORD metadata file,” Larsen mentioned.

The Hacker News Tags:Credentials, Crypto, Forcing, Hit, Malicious, Packages, PyPI, RubyGems, Security, Stealing

Post navigation

Previous Post: RubyGems Malware Attack Weaponizes 60+ Packages to Steal Credentials from Social Media and Marketing Tools
Next Post: Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data

Related Posts

Pentests once a year? Nope. It’s time to build an offensive SOC The Hacker News
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild The Hacker News
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News
Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits The Hacker News
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store
  • Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise
  • CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds
  • AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
  • Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store
  • Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise
  • CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds
  • AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
  • Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News