Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk
Tags
attack-pattern: | Data Impersonation - T1656 Malware - T1587.001 Malware - T1588.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Software - T1592.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 3c37c54a-d86c-4e36-9284-40799bec819d |
Fingerprint | 7390a0da874a70b |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 4, 2024, 12:59 p.m. |
Added to db | Sept. 4, 2024, 3:26 p.m. |
Last updated | Nov. 17, 2024, 6:30 p.m. |
Headline | Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk |
Title | Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk |
Detected Hints/Tags/Attributes | 58/1/12 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 99 | ✔ | Cyware News - Latest Cyber News | https://cyware.com/allnews/feed | 2024-08-30 22:08 |
Details | 144 | ✔ | From the Frog's mouth - JFrog Blog | https://jfrog.com/blog/feed | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 138 | setup.py |
|
Details | Domain | 1174 | gmail.com |
|
Details | Domain | 4126 | github.com |
|
Details | Domain | 1 | yyds.yyzs.workers.dev |
|
Details | 1 | cheney.yan@gmail.com |
||
Details | 1 | jinnis.developer@gmail.com |
||
Details | File | 127 | setup.py |
|
Details | Github username | 1 | jinnis423 |
|
Details | IPv4 | 17 | 0.0.0.1 |
|
Details | Url | 1 | https://github.com/jinnis423/pingdomv3 |
|
Details | Url | 1 | https://github.com/jinnis423. |
|
Details | Url | 1 | https://yyds.yyzs.workers.dev/meta/statistics |