Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Latest PyPi Compromise

0
Medium
Published: Tue May 19 2026 (05/19/2026, 22:26:56 UTC)
Source: AlienVault OTX General

Description

A supply chain attack compromised Microsoft DurableTask Python client versions 1. 4. 1, 1. 4. 2, and 1. 4. 3 on PyPi by abusing a compromised GitHub account to steal PyPi tokens. The malware targets Linux systems, stealing credentials from cloud providers (AWS, Azure, GCP), Kubernetes, Vault, and password managers such as Bitwarden and 1Password. It propagates laterally via AWS SSM and Kubernetes, limiting infection to five targets per host. The payload also scrapes shell history, brute forces password managers, and maintains persistence through infection markers.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/21/2026, 00:48:36 UTC

Technical Analysis

This threat involves a supply chain compromise of the Microsoft DurableTask Python client on PyPi, affecting versions 1.4.1 to 1.4.3. The attacker gained access by compromising a GitHub account previously linked to attacks and extracted GitHub secrets containing PyPi tokens. The malicious payload targets Linux environments to steal credentials from multiple cloud platforms and password managers. It spreads laterally using AWS Systems Manager (SSM) and Kubernetes mechanisms, with a propagation limit of five targets per infected host. The malware collects shell history, attempts brute force attacks on password managers, and establishes persistence via infection markers. The compromised packages have been quarantined, but no explicit patch or fix details are provided.

Potential Impact

The attack enables credential theft from critical cloud infrastructure and password management tools, potentially allowing unauthorized access to cloud resources and sensitive data. Lateral movement capabilities increase the risk of broader network compromise within affected environments. The infection persistence and credential harvesting techniques pose a medium-level threat to affected Linux systems using the compromised DurableTask client versions.

Mitigation Recommendations

The compromised DurableTask packages on PyPi have been quarantined following analysis. No official patch or remediation instructions are provided in the available information. Users should avoid using the affected versions (1.4.1, 1.4.2, 1.4.3) of the DurableTask Python client until further guidance or fixed versions are released by the vendor. Monitor official vendor advisories and trusted sources for updates on remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wiz.io/blog/durabletask-teampcp-supply-chain-attack"]
Adversary
TeamPCP
Pulse Id
6a0ce3b0ad791179648c47b0
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip83.142.209.194

Domain

ValueDescriptionCopy
domaint.m-kosche.com
domaincheck.git-service.com

Url

ValueDescriptionCopy
urlhttps://check.git-service.com/rope.pyz
urlhttps://t.m-kosche.com/rope.pyz

Hash

ValueDescriptionCopy
hash069ac1dc7f7649b76bc72a11ac700f373804bfd81dab7e561157b703999f44ce
hash7d80b3ef74ad7992b93c31966962612e4e2ceb93e7727cdbd1d2a9af47d44ba8
hash877ff2531a63393c4cb9c3c86908b62d9c4fc3db971bc231c48537faae6cb3ec
hashaeaf583e20347bf850e2fabdcd6f4982996ba023f8c2cd56bbd299cfd56516f5

Threat ID: 6a0e52dcba1db47362ca4f78

Added to database: 5/21/2026, 12:33:32 AM

Last enriched: 5/21/2026, 12:48:36 AM

Last updated: 5/21/2026, 4:00:51 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses