Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Posted on August 19, 2025August 19, 2025 By CWS

Aug 19, 2025Ravie LakshmananSupply Chain Safety
The maintainers of the Python Package deal Index (PyPI) repository have introduced that the bundle supervisor now checks for expired domains to forestall provide chain assaults.
“These adjustments enhance PyPI’s general account safety posture, making it tougher for attackers to use expired domains to achieve unauthorized entry to accounts,” Mike Fiedler, PyPI security and safety engineer on the Python Software program Basis (PSF), stated.
With the newest replace, the intention is to sort out area resurrection assaults, which happen when unhealthy actors buy an expired area and use it to take management of PyPI accounts by password resets.
PyPI stated it has unverified over 1,800 e mail addresses since early June 2025, as quickly as their related domains entered expiration phases. Whereas this isn’t a foolproof resolution, it helps plug a big provide chain assault vector that will in any other case seem reputable and onerous to detect, it added.

Electronic mail addresses are tied to domains that, in flip, can lapse, if left unpaid – a vital threat for packages distributed by way of open-source registries. The risk is magnified if these packages have lengthy been deserted by their respective maintainers, however are nonetheless in a good quantity of use by downstream builders.
PyPI customers are required to confirm their e mail addresses in the course of the account registration part, thus guaranteeing that the offered addresses are legitimate and accessible to them. However this layer of protection is successfully neutralized ought to the area expire, thus permitting an attacker to buy the identical area and provoke a password reset request, which might land of their inbox (versus the precise proprietor of the bundle).

From there, all of the risk actor has to do is comply with by the steps to achieve entry to the account with that area title. The risk posed by expired domains arose in 2022, when an unknown attacker acquired the area utilized by the maintainer of the ctx PyPI bundle to achieve entry to the account and publish rogue variations to the repository.
The most recent safeguard added by PyPI goals to forestall this type of account takeover (ATO) state of affairs and “decrease potential publicity if an e mail area does expire and alter fingers, no matter whether or not the account has 2FA enabled.” It is price noting that the assaults are solely relevant to accounts which have registered utilizing e mail addresses with a customized area title.

PyPI stated it is making use of Fastly’s Standing API to question the standing of a site each 30 days and mark the corresponding e mail tackle as unverified if it has expired.
Customers of the Python bundle supervisor are being suggested to allow two-factor authentication (2FA) and add a second verified e mail tackle from one other notable area, reminiscent of Gmail or Outlook, if the accounts solely have a single verified e mail tackle from a customized area title.

The Hacker News Tags:Account, Attacks, Blocks, Chain, Emails, ExpiredDomain, Prevent, PyPI, Supply, Takeovers

Post navigation

Previous Post: Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield
Next Post: CISA Warns of Trend Micro Apex One OS Command Injection Vulnerability Exploited in Attacks

Related Posts

Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access The Hacker News
Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News
ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service The Hacker News
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan The Hacker News
AI Advances Transform Cybersecurity Post-Alert Response AI Advances Transform Cybersecurity Post-Alert Response The Hacker News
Why Exposed Credentials Remain Unfixed—and How to Change That Why Exposed Credentials Remain Unfixed—and How to Change That The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark