A recent finding by Socket's Threat Research Team has uncovered a malicious Python library called psslib, designed to crash Windows systems with the false promise of being a password security utility. The library is a typosquat of the highly trusted and authoritative passlib library, an extremely popular password hashing library with more than 8.9 million monthly downloads. Through the imitation of passlib's name, the attacker—purportedly under the alias umaraq tries to mislead developers into installing the malicious package by accident via typos or autocompletion suggestions. After installation, psslib conceals its nefarious purpose behind a function called spc(), which employs easygui.enterbox() to request passwords from users. When the response fails to match a hard-coded value, the script straight away runs the Windows command shutdown /s /t 1, which shuts down the system within one second. This may lead to unexpected data loss or process disruption, particularly perilous in development environments. The danger does not stop there. The package also has two other functions, src() and error(), which will initiate a system shutdown without even needing any user input or verification. These functions expand the threat surface so that any use of the package can be potentially catastrophic, particularly if it's called by scripts with escalated permissions. Socket noted that the malicious activity is precisely crafted for Windows-based environments, as the shutdown command does not work on Linux or macOS. This only serves to illustrate the attacker's goal of aiming at a specific group of users—developers operating within Windows environments—where such commands can be executed silently and go unnoticed. The discovery should remind us to thoroughly check package names and sources before installing.
Security researchers have uncovered a sophisticated phishing campaign targeting TRON wallet users through a malicious Chrome extension impersonating the popular TronLink wallet. Th...
Online shoppers are facing a renewed threat as cybercriminals linked to the Magecart ecosystem have begun abusing Google Tag Manager (GTM) containers to distribute malicious credit...
A serious security flaw has been discovered in the Cline kanban package that could allow attackers to perform remote code execution, steal sensitive data, and stop active AI sessio...