Cybersecurity

researchers have once again found malicious packages lurking in Python

s official repository, PyPI.

According to estimates from the security research team at DevOps specialists JFrog, the eight malicious Python packages were downloaded more than 30,000 times. 

The researchers analysis

reveals that the tainted packages are designed to sniff out credit card

information thats usually auto-saved by some popular web browsers

including Chrome

and Edge

.

“The continued discovery of malicious software packages in popular repositories like PyPI is an alarming trend that can lead to widespread supply chain attacks. The ability for attackers to use simple obfuscation techniques to introduce malware

means developers have to be concerned and vigilant,” observed Asaf Karas, CTO, Security at JFrog.

PyPI has purged the packages after being alerted by JFrog. 

According to the JFrog, in addition to siphoning credit card details, the packages also scraped tokens of the Discord

messaging platform, which could be used to impersonate the user. 

PyPI has been at the receiving end of several campaigns to poison the repository with malicious packages. Earlier this year in June, PyPI was purged of half a dozen typosquatting packages

that contained cryptomining

malware, and a month before that the repository was flooded with spam packages

.

In fact, a recent study revealed that almost half of the packages in PyPI have one or more security issues

.

The researchers believe a lack of moderation and automated security controls in PyPI and other public software repositories makes it fairly straightforward for threat actors to inject malicious code.

JFrog suggests that developers must integrate preventive measures such as verification of library signatures in their CI/CD pipelines

, along with tools that scan for suspicious code.

“This is a systemic threat, and it needs to be actively addressed on several layers, both by the maintainers of software repositories and by the developers,” believes Karas.