Guest viewing is limited
  • Welcome to PawProfitForum.com - LARGEST ONLINE COMMUNITY FOR EARNING MONEY

    Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

❕NEWS PyPI Package Steals Discord Authentication Tokens From Developers

Another piece of malware has been discovered on PyPI, this time targeting Discord developers. The pycord-self package steals authentication tokens and installs a backdoor, allowing its operators to remotely access the victim’s system.

The malicious package disguises itself as the popular discord.py-self (28 million downloads) and even offers some of its functionality. The original discord.py-self is a Python library that allows you to interact with the Discord user API and manage accounts programmatically. This library is usually used for automation, creating bots, moderation, notifications, and executing commands and extracting data without a bot account.

According to specialists from , the malware appeared on PyPI back in June last year, and over the past months it has been downloaded 885 times. Pycord-self performs two key tasks. The first is stealing Discord authentication tokens and transmitting them to the attackers at an external URL. With the help of such a stolen token, hackers will be able to take over the developer's account without credentials, even if two-factor authentication is enabled. The second function of the malware is to install a hidden backdoor through a permanent connection to a remote server on port 6969.







You must be registered for see images



[td]"Depending on the OS, a shell is launched (bash on Linux or cmd on Windows), which gives the attackers permanent access to the victim's system," explains Socket. "The backdoor runs in a separate thread, so it is difficult to detect, since the package itself continues to appear to be running."[/td]
The researchers once again remind that developers should check the authorship of packages before installing them, and it is also important to look carefully at the name of the library so as not to fall for the bait of typosquatters.
 

It only takes seconds—sign up or log in to comment!

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Back
Top