On Monday, researchers from ReversingLabs uncovered the latest instance of a malicious Python Package Index (PyPI) package impersonating a valid package. This now-removed package, called “SentinelOne”, contained the full functionality of SentinelOne’s software development kit (SDK), but also sought and exfiltrated developer-related information, such as AWS and Kube configuration data, SSH keys, and git-related information. The same threat actor also had multiple similarly-named packages without the malicious payload included. The “SentinelOne” package was uploaded 11 December, and had been updated multiple times until its final release on 13 December. In general, malicious PyPI packages have gone down in number since last year, but are still a significant threat to developers.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security