Phylum Research Team

Phylum Research Team

Hackers, Data Scientists, and Engineers responsible for the identification and takedown of software supply chain attackers.

Malicious Actors Use Unicode Support in Python to Evade Detection

Phylum’s automated platform recently detected the onyxproxy package on PyPI, a malicious package that harvests and exfiltrates credentials and other sensitive data. In many ways, this package typifies other token stealers that we have found

Software Development Is Changing Again…

Development is happening more quickly than ever before, and Department of Defense stakeholders want more automation in software development and acquisitions. Recent strategic initiatives from the White House to the DoD Chief Information Officer are driving

A PyPI typosquatting campaign post-mortem

tl;dr - An unsophisticated actor efficiently published about a thousand typosquatted packages of forty popular Python packages containing malicious code in a campaign that lasted two days, but actually only took about an hour to

If SBOMs are a must, let’s make them as effective as possible

Since the announcement of Executive Order 14028, curiosity and confusion around SBOM (Software Bill of Materials) mandates has been widespread. SBOMs are indeed a jumping off point when it comes to the task of building an

Phylum Discovers Aggressive Attack on PyPI Attempting to Deliver Rust Executable

🚨 This appears to be an ongoing attack. As of the morning of 2/24/2023 an additional 600+ packages have been published by this actor. In total we have identified 5,943 malicious packages. These packages