Researchers spotted malware peddlers openly selling an info-stealer on the Python Package Index (PyPI) — the official, public repository for the Python programming language — with only the thinnest concealment.
The attackers, who Sonatype researchers linked to the SylexSquad malware-as-a-service (MaaS) gang in Spain, gave their programme a not-so-subtle name: “reverse-shell.” Reverse shells are programmes that are often used by hackers to run commands remotely and receive data from targeted machines.
“I think what’s quite funny about this is that it’s just so blatant,” says Dan Conn, developer advocate at Sonatype. “Perhaps SylexSquad were advertising themselves, or they simply didn’t care about being caught.”
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: