PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain AttacksA new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.#sentinelone#EN#2022#PyPI#JuiceLedger#infostealer#malware#ANALYSIS·sentinelone.com·Sep 3, 2022PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
Two more malicious Python packages in the PyPIWe used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI.#securelist#2022#EN#PyPI#Credentials-theft#Data-theft#Malware#Open-source#Python#Trojan·securelist.com·Aug 16, 2022Two more malicious Python packages in the PyPI
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain AttacksA new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.#sentinelone#EN#2022#PyPI#JuiceLedger#infostealer#malware#ANALYSIS·sentinelone.com·Sep 3, 2022PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
Two more malicious Python packages in the PyPIWe used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI.#securelist#2022#EN#PyPI#Credentials-theft#Data-theft#Malware#Open-source#Python#Trojan·securelist.com·Aug 16, 2022Two more malicious Python packages in the PyPI
Two more malicious Python packages in the PyPIWe used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI.#securelist#2022#EN#PyPI#Credentials-theft#Data-theft#Malware#Open-source#Python#Trojan·securelist.com·Aug 16, 2022Two more malicious Python packages in the PyPI