Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Malicious PyPI Packages Expose Users to Credential Stuffing and Data Exfiltration


A recent discovery has revealed malicious Python packages uploaded to the Python Package Index (PyPI) repository, which can be used to validate user accounts on popular social media platforms like Instagram and TikTok. These packages have been found to exploit vulnerabilities in these APIs to steal sensitive information from users.

  • Malicious PyPI packages were discovered that can be used to validate user accounts and steal sensitive information from users.
  • Three malicious packages, "checker-SaGaF", "steinlurks", and "sinnercore", were found on PyPI, designed to send HTTP requests to TikTok and Instagram APIs to determine if an email address is valid.
  • A backdoor implant was found in the packages, allowing attackers to execute malicious code on a compromised system.
  • A malicious npm package was discovered that installs a data-exfiltration backdoor in chatbots powered by the Koishi framework.
  • The discovery highlights the importance of protecting personal data and taking steps to prevent credential stuffing and data exfiltration attacks.


  • Cybersecurity researchers have made a concerning discovery regarding malicious PyPI packages that have been uploaded to the Python Package Index (PyPI) repository. These packages, which are designed to check if an email address is associated with a specific social media account, can be used to validate user accounts and steal sensitive information from users.

    According to recent reports, three malicious packages were found to be available on PyPI: "checker-SaGaF", "steinlurks", and "sinnercore". These packages are designed to send HTTP POST requests to the TikTok and Instagram APIs, respectively, to determine if an email address is valid. This can potentially lead to credential stuffing attacks, where an attacker uses a stolen email address to gain access to an account.

    One of the most concerning aspects of these packages is that they have been found to contain a backdoor implant, which allows attackers to execute malicious code on a compromised system. The package "dbgpkg", which masquerades as a debugging utility, has been found to contain this same payload as another package called "discordpydebug". This suggests that the attack may be the work of a sophisticated threat actor who is using identical payloads to evade detection.

    Furthermore, a malicious npm package called "koishi-plugin-pinhasfa" has also been discovered, which installs a data-exfiltration backdoor in chatbots powered by the Koishi framework. This package scans every message for an eight-character hexadecimal string, which can potentially unlock wider systems or map internal assets.

    The discovery of these malicious packages highlights the importance of being vigilant when it comes to the security of our personal data. Social media platforms like Instagram and TikTok have become increasingly popular targets for attackers looking to steal sensitive information from users. By using vulnerable APIs to validate user accounts, attackers can gain access to a wealth of sensitive information, including email addresses, passwords, and other credentials.

    In light of this discovery, it is essential that individuals take steps to protect themselves against these types of attacks. This includes being cautious when sharing personal data online, using strong and unique passwords, and keeping software up-to-date with the latest security patches.

    The incident also raises questions about the role of open-source packages in cybersecurity. While PyPI and other package repositories are designed to provide a convenient way for developers to share their work, they can also serve as a vector for malicious activity if not properly vetted. This highlights the need for greater scrutiny when it comes to the packages that are available on these platforms.

    In conclusion, the discovery of these malicious PyPI packages serves as a reminder of the ongoing threat landscape in cybersecurity. By staying informed and taking steps to protect ourselves against these types of attacks, we can reduce our risk of falling victim to credential stuffing and data exfiltration attempts.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/Malicious-PyPI-Packages-Expose-Users-to-Credential-Stuffing-and-Data-Exfiltration-ehn.shtml

  • https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html

  • https://socket.dev/blog/malicious-checker-packages-on-pypi-probe-tiktok-and-instagram

  • https://success.trendmicro.com/en-US/solution/KA-0009376

  • https://www.bleepingcomputer.com/news/security/malicious-pypi-package-hides-rat-malware-targets-discord-devs-since-2022/

  • https://cybersecuritynews.com/malicious-python-package-mimic-as-attacking-discord-developers/

  • https://cybersecuritynews.com/apt-attack/

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/


  • Published: Tue May 20 02:26:28 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us