This could possibly go in the scripting topic.
According to these folks (jfrog.com) and to quote:
This is an on-going issue with repositories (and has been since Perl years ago) and languages that are based on this model.
Trust is something we often give out when probably we shouldn't.
For developers to assume the code they pull in is safe is just reckless. End-users, unfortunately, are at the mercy of packagers and port maintainers.
I did manage to find a reference to the affected packages, but I am not sure this is a definitive list:
According to these folks (jfrog.com) and to quote:
As part of an ongoing effort by the JFrog security research team (formerly Vdoo) to automatically
identify malicious packages, we are now reporting several Python packages hosted on PyPI as
malicious. We have alerted PyPI about the existence of the malicious packages which promptly
removed them.
JFrog Detects Malicious PyPI Packages Stealing Credit Cards and Injecting Code
JFrog finds a new supply chain attack targeting python developers using the PyPI repository
jfrog.com
This is an on-going issue with repositories (and has been since Perl years ago) and languages that are based on this model.
Trust is something we often give out when probably we shouldn't.
For developers to assume the code they pull in is safe is just reckless. End-users, unfortunately, are at the mercy of packagers and port maintainers.
I did manage to find a reference to the affected packages, but I am not sure this is a definitive list:
Software downloaded 30,000 times from PyPI ransacked developers’ machines
Expect to see more of these “Frankenstein” malware packages, researchers warn.
arstechnica.com