Protection From Malicious Python Libraries Jeilyfish and Python3-dateutil
Blog post from Sysdig
Two malicious Python libraries, jeilyfish and python3-dateutil, were identified on the Python Package Index (PyPI) as typosquatting versions of legitimate libraries, aiming to deceive developers into downloading them. The jeilyfish library, active for nearly a year, was particularly harmful, as it collected and transmitted sensitive information such as SSH and GPG keys to a server. Meanwhile, python3-dateutil was malicious by referencing jeilyfish. To safeguard against such threats, Sysdig Secure offers a comprehensive solution by integrating image scanning and runtime policies within CI/CD pipelines. This allows detection and prevention of trojanized libraries and their activities, using tools like Falco to monitor and act against suspicious runtime behaviors, ensuring protection from similar zero-day threats and typosquatting attacks.