JFrog Sounds Alarm on Crypto-Stealing Python Package



Understanding the Threat

JFrog’s security team has discovered a concerning supply chain attack. This attack involves a malicious Python package named “ccxd python m-exe – futures.” This package pretends to be the well-known “ccxt” package, which is used for cryptocurrency exchange trading. The harmful package can cause significant damage, and it’s crucial for everyone, especially developers and cryptocurrency traders, to be aware of it.



The ccxt library is a useful tool for developers working with crypto exchanges. It contains a collection of crypto exchange classes, each implementing the necessary public and private API for a specific crypto exchange. All exchanges in the library are derived from a base exchange class and share common methods. This library is frequently updated with new exchanges, making it a popular choice for developers. However, this popularity has also made it a target for attackers.

The Attack Strategy

Once the malicious package infiltrates a system, attackers aim to steal user credentials, particularly those for the MEXC exchange platform. The attackers use a technique called typosquatting. This involves creating packages or domain names that look similar to legitimate ones, but with slight variations or spelling errors. This strategy is designed to trick users into downloading harmful packages or visiting fake websites.

The main goal of these attackers is to deceive users into visiting a fraudulent third-party site. Once there, they can steal personal information, install malware, or redirect users to other malicious servers. Brian Moussalli, the leader of JFrog’s supply chain security team, emphasized the danger of this attack to The New Stack. He highlighted that the attack targets developers and cryptocurrency traders using custom scripts. Due to the nature of supply chain attacks, the potential victim pool is vast.

See also  'Like a python attempting to swallow a pig': Talking Terra LUNAcy with Sydney crypto fundie Balmoral Digital

Spotting the Red Flags

Identifying the malicious package is tricky because it closely mimics the original. Moussalli pointed out some red flags that users should be aware of. These include new users deploying packages with names similar to popular ones and packages that have few downloads. Such indicators can help users spot potential threats before they cause harm.

JFrog’s software plays a vital role in securing the software development lifecycle. It offers tools like Catalog and Distribution, which help filter packages and set approval rules. Moussalli mentioned that the attack, discovered about two weeks ago, affected several repositories, including PyPI, npm, NuGet, and GitHub.

Targeting Vulnerable Spots

While crypto trading mechanisms are generally secure, attackers often target softer spots. These include communication with servers, crypto wallets, and the early stages of trading to steal credentials. If attackers successfully use stolen credentials, they could drain a user’s crypto account, causing significant financial loss.



Moussalli explained that when examining suspicious code, they look for certain indicators. These include the creation date of the code and the author’s track record. If the author is a new user deploying a package that appears important but looks suspicious, it raises a red flag. Once JFrog identifies such packages, they report them to the repository maintainers as part of their mission to secure the software supply chain.

Protecting Your Crypto Wallet

Moussalli also revealed that JFrog has found exploits attempting to inject malicious code into crypto wallets. For instance, if you have a local application like a Coinbase, Paybis, or MoonPay wallet, attackers might inject code that alters your wallet’s behavior. This code could leak your credentials to an unauthorized third party, compromising your login credentials and potentially leading to the theft of your crypto assets.

See also  Crypto Malware Targets Bitcoin Python Library, Users Warned

The Challenge for Developers

Given the millions of software downloads occurring globally each day, Moussalli acknowledged that keeping track of all the techniques attackers use is a daunting task for developers. This is why security experts are needed to tackle these issues with new tools and techniques. Software supply chain attacks can affect an enterprise at any stage, from development to deployment. Moussalli emphasized that it would be unfair to place the entire burden of security on software development teams. Vulnerable spots could exist throughout an organization’s activities, making it a challenging task to secure every aspect.

See also  Python Users: BIPClip Is After Your Bitcoin Wallet, Via PyPI

Conclusion

The recent supply chain attack involving the malicious “ccxd python m-exe – futures” package is a stark reminder of the ever-evolving threats in the digital world. For developers and cryptocurrency traders, staying informed and vigilant is crucial. By recognizing red flags and utilizing security tools and protocols, they can protect themselves from potential attacks. As JFrog continues its mission to secure the software supply chain, it’s essential for everyone involved to play their part in safeguarding their systems and data.

Chris J. Preimesberger, a contributing writer/editor at several publications since June 2021, is a former editor in chief of eWEEK. He was responsible for the publication’s coverage for a decade (2011-2021). In his 16 years and more than 5,000 articles at eWEEK, he provided essential insights into the tech industry.

For more tech insights, subscribe to our YouTube channel to stream all our podcasts, interviews, demos, and more. Don’t miss an episode—stay updated with the fast-paced world of technology.

Hot Topics

Related Articles

bitcoin
Bitcoin (BTC) $ 118,270.69
ethereum
Ethereum (ETH) $ 3,771.49
tether
Tether (USDT) $ 1.00
bnb
BNB (BNB) $ 795.17
xrp
XRP (XRP) $ 3.20
cardano
Cardano (ADA) $ 0.828476
usd-coin
USDC (USDC) $ 1.00
matic-network
Polygon (MATIC) $ 0.236822
binance-usd
BUSD (BUSD) $ 0.997766
dogecoin
Dogecoin (DOGE) $ 0.238938
okb
OKB (OKB) $ 48.25
polkadot
Polkadot (DOT) $ 4.18
shiba-inu
Shiba Inu (SHIB) $ 0.000014
tron
TRON (TRX) $ 0.320619
uniswap
Uniswap (UNI) $ 10.60
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 118,154.66
dai
Dai (DAI) $ 1.00
litecoin
Litecoin (LTC) $ 114.83
staked-ether
Lido Staked Ether (STETH) $ 3,767.73
solana
Solana (SOL) $ 186.57
avalanche-2
Avalanche (AVAX) $ 25.00
chainlink
Chainlink (LINK) $ 18.68
cosmos
Cosmos Hub (ATOM) $ 4.80
the-open-network
Toncoin (TON) $ 3.32
ethereum-classic
Ethereum Classic (ETC) $ 23.09
leo-token
LEO Token (LEO) $ 8.99
filecoin
Filecoin (FIL) $ 2.69
bitcoin-cash
Bitcoin Cash (BCH) $ 570.21
monero
Monero (XMR) $ 322.17