Snyk has reported that there have been attempts or successful attacks targeting this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using all malicious instances of the num2words
package.
num2words is a malicious package.
A malicious actor compromised the credentials of one of the package maintainers via a phishing attack; This allowed the attacker to modify the intialization script __init__.py
and publish tampered versions of the package to PyPI.
The code attempts to load and execute a malicious DLL from within _build.py
, which is similar to the one used in the case of eslint-config-prettier. The code in the DLL establishes a secure communication with a command-and-control server, enabling the download and execution of additional malicious stealer modules intended to exfiltrate sensitive data.
Notes:
This issue is particularly relevant to Windows systems.
The attacker published the malicious package with version 0.5.15, which was removed from PyPi.
The maintainer pushed version 0.5.16; however, it was found to contain a backdoor and was removed as well.