Malicious RubyGems and PyPI Packages Target Credentials and Cryptocurrency, Forcing Security Measures

A new wave of malicious software packages has been uncovered impacting two major software ecosystems: RubyGems and the Python Package Index (PyPI). These harmful packages disguise themselves as legitimate automation tools designed for social media, blogging, and messaging platforms but covertly steal users’ credentials and target cryptocurrency wallets.

According to software supply chain security firm Socket, since at least March 2023, approximately 60 malicious RubyGems packages have been published by a threat actor operating under several aliases such as zon, nowon, kwonsoonje, and soonje. These packages claim to offer automation features for platforms including Instagram, Twitter (X), TikTok, WordPress, Telegram, Kakao, and Naver, accumulating over 275,000 downloads. However, not every download equates to infection, as multiple downloads could occur on the same system, and some may never be executed.

While these gems deliver promised functionalities like bulk posting or engagement boosting, they secretly capture and transmit usernames and passwords to attacker-controlled servers. They do this by providing a user interface that deceptively requests credentials, all the while funneling sensitive information to domains such as programzon[.]com, appspace[.]kr, and marketingduo[.]co[.]kr. These domains are known for advertising services related to mass messaging, phone number harvesting, and automated social media operations.

A notable subset of these packages, including ones named njongto_duo and jongmogtolon, target financial discussion forums by artificially inflating stock mentions and investment narratives to manipulate public perception. Most victims appear to be grey-hat marketers relying on these automation tools to run SEO, spam, and engagement campaigns.

Socket’s analysis highlights that these packages primarily target Windows users in South Korea, supported by Korean-language interfaces and exfiltration to Korean (.kr) domains. The ongoing evolution of this campaign, involving various aliases and infrastructure changes, points to a sophisticated and persistent threat operation. By embedding credential theft within seemingly legitimate automation tools, attackers effectively mask their activities amid regular user behavior.


Malicious Packages Discovered on PyPI Steal Cryptocurrency

Meanwhile, GitLab’s security researchers identified multiple typosquatting Python packages on PyPI designed to steal cryptocurrency from Bittensor wallets. These malicious packages mimic legitimate libraries used for staking operations, such as bittensor, bittenso-cli, qbittensor, and bittenso.

GitLab explained that attackers exploited users’ trust in regular blockchain staking functionality by embedding malicious code within these packages, taking advantage of both the technical process and user expectations to execute theft.


Security Response and Future Protections

In response to these and similar supply chain threats, PyPI maintainers have tightened security measures to prevent ZIP parser confusion attacks. These attacks attempt to smuggle malicious payloads into Python package installers by exploiting differences in ZIP extraction behavior among various tools.

PyPI announced plans to reject Python “wheel” packages that do not conform to expected metadata standards starting February 1, 2026. This policy follows six months of warnings to package maintainers, aiming to reduce risks from malformed or deceptive packages. The Python Software Foundation credited researchers Caleb Brown (Google Open Source Security Team) and Tim Hatch (Netflix) for reporting these vulnerabilities.


Key Takeaway

This emerging trend of malicious packages in popular open-source repositories demonstrates the ongoing risks within software supply chains, particularly as attackers leverage trusted ecosystems to distribute credential stealers and cryptocurrency-targeting malware. Organizations and developers must remain vigilant, implement strict package vetting processes, and follow best practices for secure software supply chain management to mitigate these growing threats.

Source: https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html