Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Crypto industry backs CLARITY Act yield compromise, pushes Senate Banking for markup

May 2, 2026

There Are New Developments in the KelpDAO Hack, the Largest of Recent Times, Which Affected Aave

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code
Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code
Security

Malicious PyPI Package Exposes Crypto Wallets to Infostealer Code

February 27, 2026No Comments2 Mins Read

A malicious Python Package Index (PyPI) package, dubbed “aiocpa” and engineered to steal cryptocurrency wallet data, has been uncovered by security researchers. 

The package posed as a legitimate crypto client tool while secretly exfiltrating sensitive information to a Telegram bot. Reversing Labs researchers identified and reported the threat, leading to its removal from the PyPI.

Discovered on November 21, aiocpa evaded traditional security checks by publishing authentic-looking updates to an initially benign tool. Obfuscated code within the utils/sync.py file revealed a wrapper around the CryptoPay initialization function, designed to extract tokens and other sensitive data. 

Further analysis showed that this code used layers of Base64 encoding and zlib compression to hide its malicious intent.

Unlike many attacks targeting open-source repositories, the creators of aiocpa avoided impersonation tactics. Instead, they built a user base by presenting the package as a legitimate tool. 

“A first glance at the package’s project page didn’t show any reason for suspicion. It looked like a well-maintained crypto-pay API client package, with several versions published since September 2024. It also had a well-organized documentation page,” Reversing Labs explained.

The researchers also noted an attempt to take over an existing PyPI project, “pay,” to exploit its established user base.

Lessons for Developers

Reversing Labs further warned that the aiocpa incident highlights critical steps developers should take to secure their software:

  • Pin dependencies and versions to prevent unexpected updates

  • Use hash checks to verify package integrity

  • Perform advanced security assessments using behavioral analysis tools

Read more on software supply threats: CISA Urges Improvements in US Software Supply Chain Transparency

“This incident is a clear reminder that open-source software security threats are growing and becoming harder to detect,” Reversing Labs said.

See also  NFT investor Adam Weitsman’s X account hacked to shill ‘Clawed Ape Yacht Club’

The firm also stated that the measures employed by the threat actors to conceal their malicious creation made it difficult to identify the supply chain threat, even with diligent attempts to evaluate the quality and integrity of the package.

“With the ever-growing sophistication of threat actors and the complexity of modern software supply chains, dedicated tools need to be incorporated into your development process to help prevent these threats and mitigate related risks.”

Source link

Code Crypto exposes Infostealer Malicious Package PyPI wallets

Related Posts

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Crypto industry backs CLARITY Act yield compromise, pushes Senate Banking for markup

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Brazil's central bank bans stablecoin and crypto settlement in cross-border payments

May 2, 2026
Top Posts

Android Malware Targets Banking Users Through Discord Channels

February 10, 2026

BlackLine Unveils Agentic Financial Operations to Close AI’s Governance and Trust Gap

April 14, 2026

DeFi yields are crashing so hard that they can't compete with a traditional savings account

April 7, 2026

Type above and press Enter to search. Press Esc to cancel.