Market Cap: $2.5835T -4.150%
Volume(24h): $153.6735B 54.550%
  • Market Cap: $2.5835T -4.150%
  • Volume(24h): $153.6735B 54.550%
  • Fear & Greed Index:
  • Market Cap: $2.5835T -4.150%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$82699.735037 USD

-3.52%

ethereum
ethereum

$2106.670497 USD

-2.84%

tether
tether

$1.000218 USD

0.04%

xrp
xrp

$2.195374 USD

-5.01%

bnb
bnb

$565.379421 USD

-3.18%

solana
solana

$128.785027 USD

-6.93%

usd-coin
usd-coin

$1.000085 USD

0.01%

cardano
cardano

$0.753569 USD

-6.46%

dogecoin
dogecoin

$0.175772 USD

-6.84%

tron
tron

$0.234964 USD

-2.51%

pi
pi

$1.421514 USD

-7.62%

unus-sed-leo
unus-sed-leo

$9.738269 USD

-0.17%

chainlink
chainlink

$14.221243 USD

-5.15%

hedera
hedera

$0.212864 USD

-3.34%

stellar
stellar

$0.267770 USD

-3.45%

Cryptocurrency News Articles

Crypto Bot-based Payment System Crypto Pay Hit by Software Supply Chain Intrusion

Nov 26, 2024 at 10:09 pm

Crypto Bot-based payment system Crypto Pay had its aiocpa library on the Python Package Index repository maliciously updated to facilitate private key theft through Telegram as part of a new software supply chain intrusion, The Hacker News reports.

Crypto Bot-based Payment System Crypto Pay Hit by Software Supply Chain Intrusion

Cryptocurrency payment service Crypto Pay has fallen victim to a software supply chain attack, with its aiocpa library on the Python Package Index (PyPI) repository being maliciously updated to steal private keys via Telegram, The Hacker News reports.

The initial compromise of the package, a synchronous and asynchronous Crypto API client that has since been removed from PyPI, was noted with "sync.py" script modifications in aiocpa version 0.1.13 that executed a blob code subjected to multiple encoding and compression layers, ultimately enabling Telegram bot-based exfiltration of Crypto Pay API tokens, according to a report from Phylum, which has not yet definitively attributed the package compromise to a specific actor.

"As evidenced here, attackers can deliberately maintain clean source repos while distributing malicious packages to the ecosystems," said Phylum, which urged developers to perform PyPI package source code scanning before downloading packages to mitigate potential compromise.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Mar 11, 2025