{"id":4315,"date":"2025-05-13T16:14:30","date_gmt":"2025-05-13T16:14:30","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/13\/malicious-pypi-package-posing-as-solana-tool-stole-source-code-in-761-downloads\/"},"modified":"2025-05-13T16:14:30","modified_gmt":"2025-05-13T16:14:30","slug":"malicious-pypi-package-posing-as-solana-tool-stole-source-code-in-761-downloads","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/13\/malicious-pypi-package-posing-as-solana-tool-stole-source-code-in-761-downloads\/","title":{"rendered":"Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads"},"content":{"rendered":"<p>\u200bCybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets.<br \/>\nThe package, named solana-token, is no longer available for download from PyPI, but not before it was downloaded 761 times. It was first\u00a0Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets.<br \/>\nThe package, named solana-token, is no longer available for download from PyPI, but not before it was downloaded 761 times. It was first\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets. The package, named solana-token, is no longer available for download from PyPI, but not before it was downloaded 761&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/13\/malicious-pypi-package-posing-as-solana-tool-stole-source-code-in-761-downloads\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4316,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4315"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4315"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4316"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}