
blog.phylum.io/obfuscated-pypi-packages-purporting-to-be-i18n-libraries-actually-stealing-telegram-data
Preview meta tags from the blog.phylum.io website.
Linked Hostnames
8- 6 links toblog.phylum.io
- 1 link todiscord.gg
- 1 link todocs.phylum.io
- 1 link tonews.ycombinator.com
- 1 link tophylum.io
- 1 link totwitter.com
- 1 link towww.phylum.io
- 1 link towww.reddit.com
Thumbnail

Search Engine Appearance
Obfuscated PyPI Packages Purporting to be i18n Libraries Actually Stealing Telegram Data
Phylum discovered two packages published to PyPI on October 28 that claim to be libraries for simplifying internationalization. The files were highly obfuscated and upon further inspection were found to contain malicious code designed to steal sensitive Telegram Desktop application data and system information, which it then sends to an
Bing
Obfuscated PyPI Packages Purporting to be i18n Libraries Actually Stealing Telegram Data
Phylum discovered two packages published to PyPI on October 28 that claim to be libraries for simplifying internationalization. The files were highly obfuscated and upon further inspection were found to contain malicious code designed to steal sensitive Telegram Desktop application data and system information, which it then sends to an
DuckDuckGo

Obfuscated PyPI Packages Purporting to be i18n Libraries Actually Stealing Telegram Data
Phylum discovered two packages published to PyPI on October 28 that claim to be libraries for simplifying internationalization. The files were highly obfuscated and upon further inspection were found to contain malicious code designed to steal sensitive Telegram Desktop application data and system information, which it then sends to an
General Meta Tags
9- titleObfuscated PyPI Packages Purporting to be i18n Libraries Actually Stealing Telegram Data
- charsetutf-8
- viewportwidth=device-width, initial-scale=1
- referrerno-referrer-when-downgrade
- article:published_time2023-10-31T16:53:29.000Z
Open Graph Meta Tags
8- og:site_namePhylum Research | Software Supply Chain Security
- og:typearticle
- og:titleObfuscated PyPI Packages Purporting to be i18n Libraries Actually Stealing Telegram Data
- og:descriptionPhylum discovered two packages published to PyPI on October 28 that claim to be libraries for simplifying internationalization. The files were highly obfuscated and upon further inspection were found to contain malicious code designed to steal sensitive Telegram Desktop application data and system information, which it then sends to an
- og:urlhttps://blog.phylum.io/obfuscated-pypi-packages-purporting-to-be-i18n-libraries-actually-stealing-telegram-data/
Twitter Meta Tags
11- twitter:cardsummary_large_image
- twitter:titleMalware PyPI Packages Found Stealing User Data
- twitter:descriptionPhylum discovered two packages published to PyPI on October 28 that claim to be libraries for simplifying internationalization. The files were highly obfuscated and upon further inspection were found to contain malicious code designed to steal sensitive Telegram Desktop application data and system information, which it then sends to an
- twitter:urlhttps://blog.phylum.io/obfuscated-pypi-packages-purporting-to-be-i18n-libraries-actually-stealing-telegram-data/
- twitter:imagehttps://blog.phylum.io/content/images/2023/10/pypi-malware-1.png
Link Tags
12- alternatehttps://blog.phylum.io/rss/
- canonicalhttps://blog.phylum.io/obfuscated-pypi-packages-purporting-to-be-i18n-libraries-actually-stealing-telegram-data/
- iconhttps://blog.phylum.io/content/images/size/w256h256/2023/03/phylum-logo.png
- preconnecthttps://fonts.googleapis.com
- preconnecthttps://fonts.gstatic.com
Links
13- https://blog.phylum.io/author/phylum-research-team
- https://blog.phylum.io/python-crypto-library-updated-to-steal-private-keys
- https://blog.phylum.io/q3-2024-evolution-of-software-supply-chain-security-report
- https://blog.phylum.io/supply-chain-security-typosquat-campaign-targeting-puppeteer-users
- https://blog.phylum.io/tag/insights