blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm

Preview meta tags from the blog.phylum.io website.

Linked Hostnames

10

Thumbnail

Search Engine Appearance

Google

https://blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm

Attackers Repurposing existing Python-based Malware for Distribution on NPM

Phylum identifies threat actors repurposing common PyPI malware on NPM in a burgeoning software supply chain attack.



Bing

Attackers Repurposing existing Python-based Malware for Distribution on NPM

https://blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm

Phylum identifies threat actors repurposing common PyPI malware on NPM in a burgeoning software supply chain attack.



DuckDuckGo

https://blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm

Attackers Repurposing existing Python-based Malware for Distribution on NPM

Phylum identifies threat actors repurposing common PyPI malware on NPM in a burgeoning software supply chain attack.

  • General Meta Tags

    10
    • title
      Attackers Repurposing existing Python-based Malware for Distribution on NPM
    • charset
      utf-8
    • viewport
      width=device-width, initial-scale=1
    • description
      Phylum identifies threat actors repurposing common PyPI malware on NPM in a burgeoning software supply chain attack.
    • referrer
      no-referrer-when-downgrade
  • Open Graph Meta Tags

    8
    • og:site_name
      Phylum Research | Software Supply Chain Security
    • og:type
      article
    • og:title
      Attackers Repurposing existing Python-based Malware for Distribution on NPM
    • og:description
      On April 16, 2023, Phylum's automated risk detection platform detected a surge of publications of a library called vibranced ⚠️ Check Package on NPM. In this article, we will examine the actions taken by the attackers and their attempts to distribute Python-based malware on NPM.
    • og:url
      https://blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm/
  • Twitter Meta Tags

    11
    • twitter:card
      summary_large_image
    • twitter:title
      Attackers Repurposing existing Python-based Malware for Distribution on NPM
    • twitter:description
      On April 16, 2023, Phylum's automated risk detection platform detected a surge of publications of a library called vibranced ⚠️ Check Package on NPM. In this article, we will examine the actions taken by the attackers and their attempts to distribute Python-based malware on NPM.
    • twitter:url
      https://blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm/
    • twitter:image
      https://blog.phylum.io/content/images/size/w1200/2023/04/monsterbox.png
  • Link Tags

    12
    • alternate
      https://blog.phylum.io/rss/
    • canonical
      https://blog.phylum.io/attackers-repurposing-existing-python-based-malware-for-distribution-on-npm/
    • icon
      https://blog.phylum.io/content/images/size/w256h256/2023/03/phylum-logo.png
    • preconnect
      https://fonts.googleapis.com
    • preconnect
      https://fonts.gstatic.com

Links

17