HomeVulnerabilityHundreds of deserted PyPI tasks might be hijacked: Report

Hundreds of deserted PyPI tasks might be hijacked: Report

“The issue is that whereas that is being mentioned, attackers can already use this technique to realize code execution on many PyPI customers as we’ve demonstrated.”

Recommendation for CISOs, app leaders

Infosec leaders ought to warn their employees {that a} new model of a bundle can doubtlessly embody malicious code, he mentioned, even when the final model of the bundle was fully high-quality. Upgrading is harmful, even on a previously-trusted bundle, he added.

Earlier than deciding to improve a bundle, scan or examine the newest model of that bundle to ensure it’s secure, he urged. As well as, JFrog recommends upgrading to a brand new bundle model solely after that model has existed publicly for at the very least 14 days, since after that point interval, bundle hijack makes an attempt have often been found

See also  Ransomware feared within the cyberattack on US oil providers big
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular