Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Pyronut Package Exploits Telegram Bots via Hidden Backdoor

Pyronut Package Exploits Telegram Bots via Hidden Backdoor

Posted on March 19, 2026 By CWS

A recently identified Python package, known as Pyronut, has been found on the Python Package Index (PyPI) posing a threat to developers of Telegram bots. This package masquerades as the well-known Pyrogram framework, a tool with around 370,000 monthly downloads, making it a lucrative target for cyber impersonation.

Pyronut’s Deceptive Tactics

Unlike typical typosquatting strategies, Pyronut’s creators reproduced Pyrogram’s project details verbatim, forming a malicious clone aimed at social engineering. The GitHub link associated with Pyronut led to a non-existent page, indicating its distribution was through targeted platforms like Telegram communities and developer forums rather than being stumbled upon accidentally.

Endor Labs discovered three iterations of Pyronut—versions 2.0.184, 2.0.185, and 2.0.186—on March 18, 2026, coinciding with their PyPI appearance. Prompt isolation of these versions minimized potential damage, yet developers who utilized the package within this window faced significant risks.

Mechanism of the Pyronut Backdoor

Pyronut’s stealth is attributed to its delayed activation, only executing malicious code when a bot was operational. The package contained a clandestine module in pyrogram/helpers/secret.py, which engaged silently as the Telegram client initialized, bypassing installation-time checks.

Activation of this backdoor provided the attacker with dual Remote Code Execution (RCE) capabilities, allowing arbitrary code execution and shell command execution on the victim’s system. This enabled unauthorized access to sensitive data and possible system control.

Recommendations for Affected Developers

Developers who suspect the use of Pyronut should promptly remove the package and rebuild their development environments from verified sources. It’s critical to rotate all exposed credentials, including API keys and database passwords, and to terminate any active Telegram sessions and revoke associated tokens.

Regular audits of dependency files and the adoption of cryptographic hash pinning in lockfiles are advised to avert silent package substitutions. Implementing the principle of least privilege and integrating Software Composition Analysis into CI/CD pipelines can further safeguard against similar supply chain threats.

Stay informed on cybersecurity developments by following us on Google News, LinkedIn, and X, and consider setting CSN as your preferred source on Google.

Cyber Security News Tags:Backdoor, bot security, Cybersecurity, developer security, Endor Labs, IT security, malicious package, open source security, PyPI, Pyronut, Python, remote code execution, Software Security, supply chain attack, Telegram bots

Post navigation

Previous Post: Marquis Data Breach Impacts 672,000 Individuals
Next Post: Cloaked Secures $375M to Boost Privacy Tools and Enterprise Expansion

Related Posts

SeaFlower Campaign Targets Web3 Wallets: A Closer Look SeaFlower Campaign Targets Web3 Wallets: A Closer Look Cyber Security News
WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls New Ransomware Variants Targeting Amazon S3 Services Leveraging Misconfigurations and Access Controls Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Urges Security for Microsoft Intune After Breach
  • Oasis Security Secures $120M for Identity Management Innovation
  • Urgent CISA Alert: Zimbra Vulnerability Threatens Security
  • Cloaked Secures $375M to Boost Privacy Tools and Enterprise Expansion
  • Pyronut Package Exploits Telegram Bots via Hidden Backdoor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Urges Security for Microsoft Intune After Breach
  • Oasis Security Secures $120M for Identity Management Innovation
  • Urgent CISA Alert: Zimbra Vulnerability Threatens Security
  • Cloaked Secures $375M to Boost Privacy Tools and Enterprise Expansion
  • Pyronut Package Exploits Telegram Bots via Hidden Backdoor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark