Latest PyPi Compromise
A supply chain attack compromised Microsoft DurableTask Python client versions 1. 4. 1, 1. 4. 2, and 1. 4. 3 on PyPi by abusing a compromised GitHub account to steal PyPi tokens. The malware targets Linux systems, stealing credentials from cloud providers (AWS, Azure, GCP), Kubernetes, Vault, and password managers such as Bitwarden and 1Password. It propagates laterally via AWS SSM and Kubernetes, limiting infection to five targets per host. The payload also scrapes shell history, brute forces password managers, and maintains persistence through infection markers.
AI Analysis
Technical Summary
This threat involves a supply chain compromise of the Microsoft DurableTask Python client on PyPi, affecting versions 1.4.1 to 1.4.3. The attacker gained access by compromising a GitHub account previously linked to attacks and extracted GitHub secrets containing PyPi tokens. The malicious payload targets Linux environments to steal credentials from multiple cloud platforms and password managers. It spreads laterally using AWS Systems Manager (SSM) and Kubernetes mechanisms, with a propagation limit of five targets per infected host. The malware collects shell history, attempts brute force attacks on password managers, and establishes persistence via infection markers. The compromised packages have been quarantined, but no explicit patch or fix details are provided.
Potential Impact
The attack enables credential theft from critical cloud infrastructure and password management tools, potentially allowing unauthorized access to cloud resources and sensitive data. Lateral movement capabilities increase the risk of broader network compromise within affected environments. The infection persistence and credential harvesting techniques pose a medium-level threat to affected Linux systems using the compromised DurableTask client versions.
Mitigation Recommendations
The compromised DurableTask packages on PyPi have been quarantined following analysis. No official patch or remediation instructions are provided in the available information. Users should avoid using the affected versions (1.4.1, 1.4.2, 1.4.3) of the DurableTask Python client until further guidance or fixed versions are released by the vendor. Monitor official vendor advisories and trusted sources for updates on remediation.
Indicators of Compromise
- ip: 83.142.209.194
- domain: t.m-kosche.com
- domain: check.git-service.com
- url: https://check.git-service.com/rope.pyz
- hash: 069ac1dc7f7649b76bc72a11ac700f373804bfd81dab7e561157b703999f44ce
- hash: 7d80b3ef74ad7992b93c31966962612e4e2ceb93e7727cdbd1d2a9af47d44ba8
- hash: 877ff2531a63393c4cb9c3c86908b62d9c4fc3db971bc231c48537faae6cb3ec
- hash: aeaf583e20347bf850e2fabdcd6f4982996ba023f8c2cd56bbd299cfd56516f5
- url: https://t.m-kosche.com/rope.pyz
Latest PyPi Compromise
Description
A supply chain attack compromised Microsoft DurableTask Python client versions 1. 4. 1, 1. 4. 2, and 1. 4. 3 on PyPi by abusing a compromised GitHub account to steal PyPi tokens. The malware targets Linux systems, stealing credentials from cloud providers (AWS, Azure, GCP), Kubernetes, Vault, and password managers such as Bitwarden and 1Password. It propagates laterally via AWS SSM and Kubernetes, limiting infection to five targets per host. The payload also scrapes shell history, brute forces password managers, and maintains persistence through infection markers.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a supply chain compromise of the Microsoft DurableTask Python client on PyPi, affecting versions 1.4.1 to 1.4.3. The attacker gained access by compromising a GitHub account previously linked to attacks and extracted GitHub secrets containing PyPi tokens. The malicious payload targets Linux environments to steal credentials from multiple cloud platforms and password managers. It spreads laterally using AWS Systems Manager (SSM) and Kubernetes mechanisms, with a propagation limit of five targets per infected host. The malware collects shell history, attempts brute force attacks on password managers, and establishes persistence via infection markers. The compromised packages have been quarantined, but no explicit patch or fix details are provided.
Potential Impact
The attack enables credential theft from critical cloud infrastructure and password management tools, potentially allowing unauthorized access to cloud resources and sensitive data. Lateral movement capabilities increase the risk of broader network compromise within affected environments. The infection persistence and credential harvesting techniques pose a medium-level threat to affected Linux systems using the compromised DurableTask client versions.
Mitigation Recommendations
The compromised DurableTask packages on PyPi have been quarantined following analysis. No official patch or remediation instructions are provided in the available information. Users should avoid using the affected versions (1.4.1, 1.4.2, 1.4.3) of the DurableTask Python client until further guidance or fixed versions are released by the vendor. Monitor official vendor advisories and trusted sources for updates on remediation.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.wiz.io/blog/durabletask-teampcp-supply-chain-attack"]
- Adversary
- TeamPCP
- Pulse Id
- 6a0ce3b0ad791179648c47b0
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip83.142.209.194 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaint.m-kosche.com | — | |
domaincheck.git-service.com | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://check.git-service.com/rope.pyz | — | |
urlhttps://t.m-kosche.com/rope.pyz | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash069ac1dc7f7649b76bc72a11ac700f373804bfd81dab7e561157b703999f44ce | — | |
hash7d80b3ef74ad7992b93c31966962612e4e2ceb93e7727cdbd1d2a9af47d44ba8 | — | |
hash877ff2531a63393c4cb9c3c86908b62d9c4fc3db971bc231c48537faae6cb3ec | — | |
hashaeaf583e20347bf850e2fabdcd6f4982996ba023f8c2cd56bbd299cfd56516f5 | — |
Threat ID: 6a0e52dcba1db47362ca4f78
Added to database: 5/21/2026, 12:33:32 AM
Last enriched: 5/21/2026, 12:48:36 AM
Last updated: 5/21/2026, 4:00:51 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.