Misspelled a site’s name? Cybercriminals are exploiting this to infect your computer with malware – here’s how to stay safe


- A single typo could let hackers hijack your system using malware hidden in fake packages
- Cross-platform malware now fools even experienced developers by mimicking trusted open source package names
- Attackers are exploiting developer trust with stealthy payloads that dodge malware protection tools
A new supply chain attack has revealed how something as innocuous as a typo can open the door to serious cybersecurity threats, experts have warned.
A report from Checkmarx claims malicious actors are using clever tricks to deceive developers into downloading fake packages, which can then give hackers control of their systems.
The attackers primarily target users of Colorama, a popular Python package, and Colorizr, a similar tool used in JavaScript (NPM).
Deceptive packages and the threat of typos
“This campaign targets Python and NPM users on Windows and Linux via typosquatting and name-confusion attacks,” said Ariel Harush, a researcher at Checkmarx.
The attackers use a technique called typosquatting. For example, instead of “colorama,” a developer might accidentally type “col0rama” or “coloramaa” and download a harmful version.
These fake packages were uploaded to the PyPI repository, which is the main source of Python libraries.
“We’ve found malicious Python (PyPI) packages as part of a typosquatting campaign. The malicious packages allow for remote control, persistence, etc.,” said Darren Meyer, Security Research Advocate at Checkmarx.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
What makes this campaign unusual is that the attackers mixed names from different ecosystems, useing names from the NPM world (JavaScript) to trick Python users.
This cross-platform targeting is rare and suggests a more advanced and potentially coordinated strategy.
The Windows and Linux payloads have similar upload timings and naming but use different tools, tactics, and infrastructure, which means they may not be from the same source.
Once installed, the fake packages can do serious damage – on Windows systems, the malware creates scheduled tasks to maintain persistence and harvest environment variables, which could include sensitive credentials.
It also attempts to disable even the best antivirus software using PowerShell commands like Set-MpPreference -DisableIOAVProtection $true.
On Linux systems, packages like Colorizator and coloraiz carry encoded payloads to create encrypted reverse shells, communicate via platforms like Telegram and Discord, and exfiltrate data to services like Pastebin.
These scripts are not executed all at once; they are designed for stealth and persistence, using techniques like masquerading as kernel processes and editing rc.local and crontabs for automatic execution.
Though the malicious packages have been removed from public repositories, the threat is far from over.
Developers should be very careful when installing packages because even the best endpoint protection platforms struggle with these evasive tactics. Always double-check the spelling and make sure the package comes from a trusted source.
Checkmarx recommends that organizations audit all deployed and deployable packages, proactively examine application code, scrutinize private repositories, and block known malicious names.
You might also like
A single typo could let hackers hijack your system using malware hidden in fake packages Cross-platform malware now fools even experienced developers by mimicking trusted open source package names Attackers are exploiting developer trust with stealthy payloads that dodge malware protection tools A new supply chain attack has revealed how…
Recent Posts
- Misspelled a site’s name? Cybercriminals are exploiting this to infect your computer with malware – here’s how to stay safe
- Anker’s new outdoor wireless speaker vibrates to shake off dust and sand
- The Witcher 4 tech demo ran on a base PS5 to ‘show how much we can optimize’
- Reddit will let you hide posts, comments and NSFW activity from your public profile
- Ricoh unveils the Theta A1, its most rugged 360 camera yet
Archives
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010