Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Is AI even worth it for your business? 5 expert tips to help prove ROI

    October 13, 2025

    Feeling lonely at work? You’re not alone – 5 ways to boost your team’s morale

    October 12, 2025

    New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

    October 12, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Is AI even worth it for your business? 5 expert tips to help prove ROI
    • Feeling lonely at work? You’re not alone – 5 ways to boost your team’s morale
    • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
    • These Bose headphones took my favorite AirPods Max battery feature – and did it even better
    • Dating app Cerca will show how Gen Z really dates at TechCrunch Disrupt 2025
    • I thought the Bose QuietComfort headphones already hit their peak – then I tried the newest model
    • Is this the best smart monitor for home entertainment? My verdict after a week of testing
    • Ready to ditch your Windows PC? I found a powerful mini PC that’s optimized for Linux
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Guides»Hackers are hijacking your typos to plant stealthy malware – and even the best antivirus might not catch it
    Guides

    Hackers are hijacking your typos to plant stealthy malware – and even the best antivirus might not catch it

    TechurzBy TechurzJune 3, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A woman shocked at the email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • A single typo could let hackers hijack your system using malware hidden in fake packages
    • Cross-platform malware now fools even experienced developers by mimicking trusted open source package names
    • Attackers are exploiting developer trust with stealthy payloads that dodge malware protection tools

    A new supply chain attack has revealed how something as innocuous as a typo can open the door to serious cybersecurity threats, experts have warned.

    A report from Checkmarx claims malicious actors are using clever tricks to deceive developers into downloading fake packages, which can then give hackers control of their systems.

    The attackers primarily target users of Colorama, a popular Python package, and Colorizr, a similar tool used in JavaScript (NPM).


    You may like

    Deceptive packages and the threat of typos

    “This campaign targets Python and NPM users on Windows and Linux via typosquatting and name-confusion attacks,” said Ariel Harush, a researcher at Checkmarx.

    The attackers use a technique called typosquatting. For example, instead of “colorama,” a developer might accidentally type “col0rama” or “coloramaa” and download a harmful version.

    These fake packages were uploaded to the PyPI repository, which is the main source of Python libraries.

    “We’ve found malicious Python (PyPI) packages as part of a typosquatting campaign. The malicious packages allow for remote control, persistence, etc.,” said Darren Meyer, Security Research Advocate at Checkmarx.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    What makes this campaign unusual is that the attackers mixed names from different ecosystems, useing names from the NPM world (JavaScript) to trick Python users.

    This cross-platform targeting is rare and suggests a more advanced and potentially coordinated strategy.

    The Windows and Linux payloads have similar upload timings and naming but use different tools, tactics, and infrastructure, which means they may not be from the same source.

    Once installed, the fake packages can do serious damage – on Windows systems, the malware creates scheduled tasks to maintain persistence and harvest environment variables, which could include sensitive credentials.

    It also attempts to disable even the best antivirus software using PowerShell commands like Set-MpPreference -DisableIOAVProtection $true.

    On Linux systems, packages like Colorizator and coloraiz carry encoded payloads to create encrypted reverse shells, communicate via platforms like Telegram and Discord, and exfiltrate data to services like Pastebin.

    These scripts are not executed all at once; they are designed for stealth and persistence, using techniques like masquerading as kernel processes and editing rc.local and crontabs for automatic execution.

    Though the malicious packages have been removed from public repositories, the threat is far from over.

    Developers should be very careful when installing packages because even the best endpoint protection platforms struggle with these evasive tactics. Always double-check the spelling and make sure the package comes from a trusted source.

    Checkmarx recommends that organizations audit all deployed and deployable packages, proactively examine application code, scrutinize private repositories, and block known malicious names.

    You might also like

    antivirus catch Hackers hijacking malware plant stealthy typos
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article2 days until TC Sessions: AI at UC Berkeley
    Next Article iOS 19: the 5 upgrades I’m really hoping for at WWDC 2025
    Techurz
    • Website

    Related Posts

    Security

    New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

    October 12, 2025
    Security

    Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

    October 11, 2025
    Security

    Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

    October 10, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    Is AI even worth it for your business? 5 expert tips to help prove ROI

    October 13, 2025

    Feeling lonely at work? You’re not alone – 5 ways to boost your team’s morale

    October 12, 2025

    New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

    October 12, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.