Phylum Insights and Resources

Python Trojan Functions and Imports

Learn basic techniques attackers use to create malicious packages with trojan features found in attacks, including typosquatting, starjacking, dependency confusion, and lockfile injection.

Subscribe to our insights

Keep up with the latest insights

⏲Please hold while we check our collection.

Something's gone wrong. Please try again.

Success! Check your inbox for our email.

Python Package Spoofing

Find out how easy it is for threat actors to spoof legitimate Python packages as the foundation of their attacks on the software supply chain....