
Cybersecurity researchers have flagged a malicious Python library at the Python Package deal Index (PyPI) repository that facilitates unauthorized track downloads from track streaming provider Deezer.
The bundle in query is automslc, which has been downloaded over 104,000 instances to this point. First printed in Would possibly 2019, it stays to be had on PyPI as of writing.
“Even supposing automslc, which has been downloaded over 100,000 instances, purports to provide track automation and metadata retrieval, it covertly bypasses Deezer’s get entry to restrictions via embedding hardcoded credentials and speaking with an exterior command-and-control (C2) server,” Socket safety researcher Kirill Boychenko mentioned in a document printed these days.

Particularly, the bundle is designed to log into the French track streaming platform by the use of user-supplied and hard-coded credentials, accumulate track-related metadata, and obtain complete audio information in violation of Deezer’s API phrases.
The bundle additionally periodically communicates with a far flung server positioned at “54.39.49[.]17:8031” to offer updates at the obtain standing, thereby giving the danger actor centralized management over the coordinated track piracy operation.
Put another way, automslc successfully turns the methods of the bundle customers into a bootleg community for facilitating bulk track downloads in an unauthorized way. The IP deal with is related to a site named “automusic[.]win,” which is claimed for use via the danger actor to supervise the dispensed downloading operation.

“Deezer’s API phrases forbid the native or offline garage of whole audio content material, however via downloading and decrypting whole tracks, automslc bypasses this limitation, probably striking customers liable to felony repercussions,” Boychenko mentioned.
The disclosure comes because the instrument provide chain safety corporate detailed a rogue npm bundle referred to as @ton-wallet/create that has been discovered stealing mnemonic words from unsuspecting customers and builders within the TON ecosystem, whilst impersonating the professional @ton/ton bundle.
The bundle, first printed to the npm registry in August 2024, has attracted 584 downloads to this point. It stays to be had for obtain.

The malicious capability embedded into the library is able to extracting the method.env.MNEMONIC surroundings variable, thereby giving danger actors whole get entry to to a cryptocurrency pockets and probably drain a sufferer’s virtual property. The ideas is transmitted to an attacker-controlled Telegram bot.
“This assault poses serious provide chain safety dangers, concentrated on builders and customers integrating TON wallets into their packages,” Socket mentioned. “Common dependency audits and automatic scanning gear will have to be hired to locate anomalous or malicious behaviors in third-party programs ahead of they’re built-in into manufacturing environments.”