Feb. 21, 2024, 11:16 a.m. | Eswar

GBHackers On Security gbhackers.com

Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data, and delivering second and third-stage downloaders or rootkit programs. Two open-source PyPI packages were discovered to be utilized by threat actors for executing code via DLL sideloading attacks as a means […]


The post New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack appeared first on GBHackers on Security | #1 Globally Trusted …

attack c2 infrastructure code computer security data dll dll sideloading hosting infrastructure malicious malicious pypi packages malware packages platforms pypi pypi packages researchers rootkit sideloading stage stolen supply supply chain supply chain attack supplychainsecurity third threat threat actors threats

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC