Home / Companies / Sysdig / Blog / Post Details
Content Deep Dive

Protection From Malicious Python Libraries Jeilyfish and Python3-dateutil

Blog post from Sysdig

Post Details
Company
Date Published
Author
Vicente Herrera García
Word Count
2,311
Language
English
Hacker News Points
-
Summary

Two malicious Python libraries, jeilyfish and python3-dateutil, were identified on the Python Package Index (PyPI) as typosquatting versions of legitimate libraries, aiming to deceive developers into downloading them. The jeilyfish library, active for nearly a year, was particularly harmful, as it collected and transmitted sensitive information such as SSH and GPG keys to a server. Meanwhile, python3-dateutil was malicious by referencing jeilyfish. To safeguard against such threats, Sysdig Secure offers a comprehensive solution by integrating image scanning and runtime policies within CI/CD pipelines. This allows detection and prevention of trojanized libraries and their activities, using tools like Falco to monitor and act against suspicious runtime behaviors, ensuring protection from similar zero-day threats and typosquatting attacks.