🚨 215 Million Downloads, 1 Dangerous Typo----How the Colorama Attack Redefined Supply Chain Risks Your Python dependencies could be silently hijacking your systems. Last month, attackers weaponized colorama—a tool used by 98% of Python developers—to deploy cross-platform malware via #PyPI. The campaign: Used typosquatted packages (coloramapkgsw, coloraiz) mimicking #Python and NPM ecosystems Delivered Windows/Linux payloads that: Disabled Windows Defender via PowerShell (Set-MpPreference -DisableRealtimeMonitoring $true) Masqueraded as kernel processes on Linux ([kworker/u:2]) Stole AWS keys, crypto wallets, and browser credentials from 170K+ developers Why this is very critical: 1️⃣ 54% of organizations lack Software Composition Analysis (SCA) tools to detect such threats 2️⃣ 83% of PyPI packages have at least 1 unpatched vulnerability 3️⃣ $2.3M in crypto assets were exposed via compromised GitHub accounts Details: https://lnkd.in/g-d2G4kM #SupplyChain #PyPI #DevSecOps #Colorama #Threatfeed #SecureBlink
Colorama Attack: How 215M Downloads Were Compromised
More Relevant Posts
-
Ever wonder if Lua just landed in your environment? Maybe you don’t want to think about it. Lua and LuaJIT aren’t just used for games or scripting. Attackers increasingly abuse them as lightweight, portable runtimes to execute payloads undetected. The risk: 🚨Dropping a Lua binary means instant access to a full scripting engine on your servers. That opens the door for custom malware, evasive loaders, and post-exploitation tooling. MagicSword’s WDAC policy blocks Lua binaries and execution outright on Windows. No runtime, no abuse. If you don’t have a business case for Lua, don’t let it run. Block first. Ask questions later. ⚔️
To view or add a comment, sign in
-
-
Master Termux on Android — complete practical course for cybersecurity beginners and pros. What you’ll learn: • Information gathering (nmap, whois, Recon-ng) • Vulnerability scanning & web testing (Nikto, sqlmap, WPScan) • Exploitation basics (Metasploit, Hydra) • Password cracking & hashing tools (Hydra, Hashcat) • OSINT & forensics (theHarvester, Maltego, Wireshark) • Scripting & automation (Python, Bash, Git) Important: This course is for ethical, legal learning only. Practice in labs and authorised environments. ▶️ Watch the full course: https://lnkd.in/gjFbZ2B8 If you find it useful, please Like, Comment, and Share. #Termux #Cybersecurity #EthicalHacking #OSINT #AndroidSecurity #InfoSec
Termux Complete Course | Learn Ethical Hacking, Linux & Cybersecurity on Android
https://www.youtube.com/
To view or add a comment, sign in
-
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown https://ift.tt/L2axAc5 Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken down. It was first via The Hacker News https://ift.tt/Tdq79Bm October 02, 2025 at 08:07AM
To view or add a comment, sign in
-
Inspired by Cheat Engine ⚙️, I built a small C++ project to explore practical reverse engineering a memory scanner/updater that inspects how Elden Ring stores “ruins” (coins) in memory. 🎯 The goal was purely educational to practice WinAPI, process memory access, and multi-threaded scanning, not to enable cheating. 🚫🎮 This project helped me strengthen my understanding of low-level Windows internals, concurrency, and safe memory-handling techniques. I’m open to suggestions and collaboration on secure, ethical reverse-engineering practices and defensive research. 🛠️🧠🔒 📂 GitHub Repository: https://lnkd.in/gDxKeh6t #ReverseEngineering #Cybersecurity #Cplusplus #WinAPI #Multithreading #EthicalHacking #SecurityResearch #GameDev #LearningJourney #EldenRing
To view or add a comment, sign in
-
🚀 I Just explored the latest Kali Linux 2025.3 release, and one feature immediately caught my attention: Gemini-CLI. Instead of switching between browsers and terminals, Gemini-CLI lets you bring AI-powered assistance directly into your command line. 💡 For penetration testers and security researchers, this could mean faster reconnaissance, quicker scripting, and more time to focus on problem solving. Curious to see how we will leverage this tool (Taking into consideration cost and security) the possibilities are wide open. 👉 Have you tried Gemini-CLI yet? if yes, What’s your first impression? Enow Joshua #KaliLinux #CyberSecurity #Automation #AI
To view or add a comment, sign in
-
Published a detailed walkthrough for Cybersploit 1 — covers enumeration, exploitation, and post-exploitation steps. Useful if you’re studying real-world techniques or prepping for OSCP. #oscp #penetrationtesting #redteamer #pentest #cybersecurity #AD #linux #Cybersploit1
To view or add a comment, sign in
-
Hacking Linux: Digging Up Bash History! 👉 Video: https://lnkd.in/ghWybbdv 📚 Learn Hacking: https://hacksmarter.org - In this video, I continue working through the new "BankSmarter" machine on Hack Smarter Labs. I do my best to treat it like an actual penetration test, and share with you my full methodology, note-taking process, and more.
To view or add a comment, sign in
-
-
Just finished a TryHackMe room on web vulnerabilities and wanted to share a few concrete takeaways, short, practical, and what I will actually reuse next time I test or defend an app. What I did: • Walked through XSS variants (DOM, Stored, Blind). • Used browser DevTools to manipulate form values and inspect requests, and practiced intercepting/editing requests to understand server-side validation. • Learned how payloads behave differently depending on where input is reflected (attribute vs text node vs URL/hash). What I learned: • DOM XSS runs entirely in the browser,never trust values from the URL or hash; use textContent or proper sanitizers. • Stored XSS is dangerous because malicious scripts can be saved and executed in other users’ browsers (admins especially!). Blind XSS hides execution from the attacker but can still lead to serious compromises. • Polyglot payloads are noisy and resilient defensive focus should be on context-aware encoding, strict whitelists, and a strong CSP. • Practical tools: DevTools for DOM tinkering, Burp for request editing, and keeping a tight lab log makes replaying and explaining findings way easier. Defensive takeaways: • Always validate and canonicalize input on the server. • Use HttpOnly/Secure/SameSite on sensitive cookies. • Avoid exposing sensitive actions as client-side global functions. • Apply Content Security Policy and egress filtering these reduce blast radius. #CyberSecurity #WebSecurity #TryHackMe #XSS #SSRF #BugBounty #EthicalHacking #AppSec #InfoSec #RedTeam #BlueTeam #LearningInPublic #SecurityTesting #CyberCareer #HiringCyberTalent #InfosecCommunity
To view or add a comment, sign in
-
🔥 2,653 developers just got a harsh lesson in supply chain security Malicious PyPI package "soopsocks" was downloaded thousands of times before takedown, secretly exfiltrating Windows data to Discord servers. This is why code review and dependency scanning aren't optional anymore. How do you verify the packages you install? 👇 #CyberSecurity #Python #DevSec #SupplyChain #InfoSec #PyPI #Malware #DevOps
To view or add a comment, sign in
-
More from this author
-
Chinese Hackers Hijack Notepad++, Millions of Flickr Users' Exact Locations, Habits Leaked! - Find More
Secure Blink 1d -
Nike Probes Major Data Breach, Private Accounts Potentially Exposed in Major Instagram Privacy Flaw! - Find More
Secure Blink 1w -
Under Armour Data Breach Investigation, Exposed Personal Information of Users! - Find More
Secure Blink 2w
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development