Feb. 11, 2023, 4:46 p.m. | /u/tweedge

cybersecurity www.reddit.com

This is the same actor as highlighted by [Phylum yesterday](https://blog.phylum.io/phylum-discovers-revived-crypto-wallet-address-replacement-attack) - currently they're pushing a cryptostealer everywhere they can, but who knows what's next. As of Friday they'd tried about 200 typosquats. I haven't counted today's batch but I'd estimate it's another 200-300.

Someone's clearly reached the automation section of "Black Hat Python" :P

Within the past 24 hours I've seen them typosquatting the following packages (parenthesis show an example typosquat):

* xlsxwriter (ex. xlsxwwriter)
* urllib3 (rllib3)
* simplejson …

actor automated automation black hat campaign click client cybersecurity discord packages pypi python reporting requests targeting threat threat actor toolkit typosquatting webhook websocket

Principal Security Research Manager

@ Microsoft | Redmond, Washington, United States

SOC Manager

@ Inbox Business Technologies | Islamabad, Islamabad Capital Territory, Pakistan

Cybersecurity Incident Response Program Manager (Hybrid)

@ UMB Bank | MO - Kansas City - 1010 Grand Blvd

Consultant, Cyber Risk Advisory | Remote US

@ Coalfire | United States

Cybersecurity Bid Manager

@ Alstom | Derby, GB

Cyberspace Analyst

@ Peraton | Fort Meade, MD, United States