{"id":54973,"date":"2024-01-03T16:39:54","date_gmt":"2024-01-03T16:39:54","guid":{"rendered":"http:\/\/de43841c-f67c-4310-a7fa-6bec54ed7847"},"modified":"2024-01-03T16:39:54","modified_gmt":"2024-01-03T16:39:54","slug":"developers-watch-your-code-official-python-respository-spread-malicious-projects","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/","title":{"rendered":"Developers, watch your code: Official Python respository spread malicious projects"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f6fcb4205f23d7a96f085fe1ea29fbe877acf04d\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=768\" alt=\"backdoor-gettyimages-823310866\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a874e6018a4a5f260e961410514672ded9c577a5\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1024\" alt=\"backdoor-gettyimages-823310866\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\" alt=\"backdoor-gettyimages-823310866\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\" alt=\"backdoor-gettyimages-823310866\" width=\"1280\" height=\"720.1039411000432\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">BeeBright\/Getty Images<\/span><\/figcaption><\/figure>\n<p>PyPI is the official Python Package Index that currently contains 500,972 projects, 5,228,535 million releases, 9,950,103 million files, and 770,841 users. PyPI helps users locate and install software developed and released by the Python community as well as serving as a repository where developers can distribute their software.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/how-to-use-chatgpt-to-write-code\/\" rel=\"follow\">How to use ChatGPT to write code<\/a><\/strong><\/p>\n<p>Recently, cybersecurity specialist ESET&nbsp;<a href=\"https:\/\/www.eset.com\/int\/about\/newsroom\/press-releases\/research\/eset-research-official-python-repository-served-cyberespionage-backdoor-gathered-10000-downloads\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">discovered a series of malicious Python projects<\/a> within PyPI, each of which deployed a customized backdoor containing cyberespionage functionality. The malicious code allowed file execution and file exfiltration, and could even&nbsp; &#8212; in certain scenarios &#8212; enable screenshots to be taken of a user&#8217;s screen. ESET also reported that, in some cases, the W4SP Stealer (which siphons user data) or a clipboard monitor that steals cryptocurrency is delivered instead.<\/p>\n<p>In total, 116 malicious packages in PyPI were uploaded across 53 projects and downloaded more than 10,000 times.<\/p>\n<p>According to ESET researcher Marc-Etienne M.L\u00e9veill\u00e9, &#8220;Some malicious package names do look similar to other, legitimate packages, but we believe the main way they are installed by potential victims isn&#8217;t via typosquatting, but social engineering, where they are walked through running pip to install an &#8216;interesting&#8217; package for whatever reason.&#8221;<\/p>\n<p><!----><\/p>\n<p>In his blog post, &#8220;<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/pernicious-potpourri-python-packages-pypi\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">A pernicious potpourri of Python packages in PyPI<\/a>,&#8221; M.L\u00e9veill\u00e9 said, &#8220;PyPI continues to be abused by cyber attackers to compromise Python programmers&#8217; devices.&#8221; He continues, &#8220;This campaign displays a variety of techniques being used to include malware in Python packages. Python developers should thoroughly vet the code they download, especially checking for these techniques, before installing it on their systems. As well as continuing to abuse the open-source W4SP Stealer, the operators have also deployed a simple, but effective, backdoor. We expect that such abuse of PyPI will continue and advise caution when installing code from any public software repository.&#8221;<\/p>\n<p>By the time ESET published its findings, most of the packages had been taken down by PyPI. And, at this point, all the known malicious packages are now offline.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/7-things-even-new-linux-users-can-do-to-better-secure-the-os\/\" rel=\"follow\">7 things even new Linux users can do to better secure the OS<\/a><\/strong><\/p>\n<p>The operators behind this subterfuge used three different techniques for the campaign: placing a test module with minimal, slightly obfuscated malicious code; embedding PowerShell code into the setup.py file; and including only malicious code in the package that is slightly obfuscated.<\/p>\n<p>On Windows, the backdoor was implemented in Python. On Linux, the backdoor used the Go language.&nbsp;<\/p>\n<p>Given how widespread Python is, developers should vet any third-party code they use before adding it to their projects. ESET firmly believes the abuse of PyPI will continue. M.L\u00e9veill\u00e9 went so far as to advise caution in &#8220;installing code from any public software repository.&#8221;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These malicious packages &#8211; deploying cyberespionage backdoors and targeting Windows and Linux systems &#8211; were found circulating via the PyPI repository. Security experts expect the problem to continue.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54973","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Developers, watch your code: Official Python respository spread malicious projects 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Developers, watch your code: Official Python respository spread malicious projects 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-03T16:39:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Developers, watch your code: Official Python respository spread malicious projects\",\"datePublished\":\"2024-01-03T16:39:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/\"},\"wordCount\":468,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b1408f00c61181663d5878937f4922ee5743b90c\\\/2024\\\/01\\\/03\\\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\\\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/\",\"name\":\"Developers, watch your code: Official Python respository spread malicious projects 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b1408f00c61181663d5878937f4922ee5743b90c\\\/2024\\\/01\\\/03\\\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\\\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-01-03T16:39:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b1408f00c61181663d5878937f4922ee5743b90c\\\/2024\\\/01\\\/03\\\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\\\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b1408f00c61181663d5878937f4922ee5743b90c\\\/2024\\\/01\\\/03\\\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\\\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/developers-watch-your-code-official-python-respository-spread-malicious-projects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Developers, watch your code: Official Python respository spread malicious projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Developers, watch your code: Official Python respository spread malicious projects 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/","og_locale":"en_US","og_type":"article","og_title":"Developers, watch your code: Official Python respository spread malicious projects 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-03T16:39:54+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Developers, watch your code: Official Python respository spread malicious projects","datePublished":"2024-01-03T16:39:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/"},"wordCount":468,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/","url":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/","name":"Developers, watch your code: Official Python respository spread malicious projects 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280","datePublished":"2024-01-03T16:39:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b1408f00c61181663d5878937f4922ee5743b90c\/2024\/01\/03\/5dbc0cec-db1a-4c2c-b1ed-df7c3226e049\/backdoor-gettyimages-823310866.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/developers-watch-your-code-official-python-respository-spread-malicious-projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Developers, watch your code: Official Python respository spread malicious projects"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54973"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54973\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}