Phylum’s cybersecurity experts have detected a malicious payload embedded within a popular Python package on the PyPI repository. The package, Mobile Application Development in Chandigarh named requests-darwin-lite, is an unauthorised variant of the widely-used requests library. The requests-darwin-lite package was cleverly designed to emulate its legitimate counterpart but included a Go binary concealed within an oversized Mobile Application Development in Chandigarh image file pretending to be a simple logo. This file – a PNG labelled as a sidebar image – unusually weighed around 17MB, a stark contrast to the normal size of approximately 300kB for the genuine version.
During the installation of the package, a specialised command class ‘PyInstall’ was triggered if the installation environment was macOS. This class executed a base64-encoded command that extracted the system’s UUID (Universal Unique Identifier).
Email us: contact@neptunesolution.in
Call: 0172-4102740, +91-9780373638, 7495055288 for more details.
Visit us: www.neptunesolution.in
Office address: Sector 34-A, SCO 156-157, second floor, Near Verka Corporate Office, Chandigarh – 160022