Supply Chain Attack Discovered Using Fake Python Infrastructure
The multi-stage and evasive malicious payload harvests passwords, credentials, and more dumps of valuable data from infected systems and exfiltrates them to the attacker’s infrastructure.