Multiple malicious Python packages targeting crypto developers and their applications were discovered on PyPI. The packages were used to steal funds by executing a stealthy staking operation. In this specific case, the attackers hooked a legitimate staking function to redirect the funds to their own wallet. The attack leveraged typosquatting to target the popular bittensor
package.
Following malicious packages were disclosed by GitLab Vulnerability Research Team:
SafeDep open source tools especially vet and pmg can help protect developers from malicious packages and other open source software supply chain attacks.
Our automated systems flagged the packages as suspicious due to multiple signals, including identifying the malicious code and intention in typosquatting packages. See example
5FjgkuPzAQHax3hXsSkNtue8E7moEYjTgrDDGxBvCzxc1nqR
transfer_all=True
indicating operations without user consentMalicious Package | SafeDep Analysis | Flagged At |
---|---|---|
[email protected] | Link | 8/6/2025, 2:53:48 AM |
[email protected] | Link | 8/6/2025, 2:59:52 AM |
[email protected] | Link | 8/6/2025, 3:03:45 AM |
[email protected] | Link | 8/6/2025, 3:16:03 AM |
[email protected] | Link | 8/6/2025, 3:17:10 AM |
SafeDep vet alerted users in CI/CD pipelines when trying to add any of the compromised package through a PR.
SafeDep pmg will alert developers when trying to install any of the compromised package.
At SafeDep, we believe code is the source of truth. We perform code analysis to detect vulnerabilities and malicious code in open source packages. If that is not feasible, general security best practices can be used to protect against common open source software supply chain attacks.
SafeDep vet seamlessly integrates with your CI/CD pipeline and alerts you when trying to add any of the compromised package through a PR. SafeDep pmg will alert developers when trying to install any of the compromised package.
Join thousands of developers and organizations who trust SafeDep to protect their software supply chain.