Multi-Backdoored Python Libraries Found Stealing AWS Secrets and Keys

Share post:

Researchers have unraveled a series of malicious Python packages in the official third-party software repository that are engineered to draw out AWS credentials and environment variables onto a publicly exposed endpoint.

According to Sonatype security researcher Ax Sharma, some of the packages include loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils. Both the packages and the endpoints have now been taken down.

“Some of these packages either contain code that reads and exfiltrates your secrets or use one of the dependencies that will do the job,” Sharma said.

The malicious code injected into “loglib-modules” and “pygrata-utils” enable the packages to obtain AWS credentials, network interface information, and environment variables and export them to a remote endpoint.

These endpoints hosting this information via hundreds of .TXT files were not secured by any authentication barrier, thus allowing any party on the web to obtain these credentials.

“Were the stolen credentials being intentionally exposed on the web or a consequence of poor OPSEC practices?Should this be some kind of legitimate security testing, there surely isn’t much information at this time to rule out the suspicious nature of this activity,” Sharma said. 

A Turkey-based security researcher, Yunus Aydın, has claimed responsibility for the unauthorized changes, stating he merely wanted to “show how this simple attack affects +10M users and companies.”

Incidentally, Code White, a German penetration testing company, claimed responsibility for uploading malicious packages to the NPM registry, attempting to realistically mimic dependency confusion attacks aimed at its customers in the country, most of whom are big media, logistics, and industrial firms.

For more information, read the original story in Thehackernews.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways