Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk
Common Information
Type Value
UUID 3c37c54a-d86c-4e36-9284-40799bec819d
Fingerprint 7390a0da874a70b
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 4, 2024, 12:59 p.m.
Added to db Sept. 4, 2024, 3:26 p.m.
Last updated Nov. 17, 2024, 6:30 p.m.
Headline Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk
Title Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk
Detected Hints/Tags/Attributes 58/1/12
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 99 Cyware News - Latest Cyber News https://cyware.com/allnews/feed 2024-08-30 22:08
Details 144 From the Frog's mouth - JFrog Blog https://jfrog.com/blog/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 138
setup.py
Details Domain 1174
gmail.com
Details Domain 4126
github.com
Details Domain 1
yyds.yyzs.workers.dev
Details Email 1
cheney.yan@gmail.com
Details Email 1
jinnis.developer@gmail.com
Details File 127
setup.py
Details Github username 1
jinnis423
Details IPv4 17
0.0.0.1
Details Url 1
https://github.com/jinnis423/pingdomv3
Details Url 1
https://github.com/jinnis423.
Details Url 1
https://yyds.yyzs.workers.dev/meta/statistics