{"id":2994,"date":"2024-12-24T15:22:47","date_gmt":"2024-12-24T15:22:47","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/24\/researchers-uncover-pypi-packages-stealing-keystrokes-and-hijacking-social-accounts\/"},"modified":"2024-12-24T15:22:47","modified_gmt":"2024-12-24T15:22:47","slug":"researchers-uncover-pypi-packages-stealing-keystrokes-and-hijacking-social-accounts","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/24\/researchers-uncover-pypi-packages-stealing-keystrokes-and-hijacking-social-accounts\/","title":{"rendered":"Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts"},"content":{"rendered":"<p>\u200bCybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs.<br \/>\nThe packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down.\u00a0Cybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs.<br \/>\nThe packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down.\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs. The packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down.\u00a0Cybersecurity&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/24\/researchers-uncover-pypi-packages-stealing-keystrokes-and-hijacking-social-accounts\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2994"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2994"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2994\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2995"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}