Contact

PyPI Supply Chain Attack Uncovered: Colorama and Colorizr Name Confusion

NetmanageIT OpenCTI - opencti.netmanageit.com

PyPI Supply Chain Attack Uncovered: Colorama and Colorizr Name Confusion



SUMMARY :

A malicious package campaign targeting Python and NPM users on Windows and Linux has been discovered. The attack uses typo-squatting and name-confusion tactics against the popular colorama Python package and the similar colorizr JavaScript package. Multiple packages with risky payloads were uploaded to PyPI, using names similar to legitimate packages in both PyPI and NPM. The unusual tactic of using an NPM package name to attack PyPI users was observed. The payloads allow remote access, control of desktops and servers, and exfiltration of sensitive data. Windows payloads attempt to bypass antivirus protection. The campaign's sophistication suggests targeted adversarial activity, although attribution remains unclear.

OPENCTI LABELS :

pypi,typosquatting,colorama,remote-access,npm,data-exfiltration,supply-chain-attack,colorizr


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


PyPI Supply Chain Attack Uncovered: Colorama and Colorizr Name Confusion