submeta
11 hours ago
> It revolves around creating fake job ads and luring software developers to apply. During the hiring process, the crooks would trick the devs into downloading and running malicious packages, thus granting the attackers access to important resources.
Ok, that‘s a completely different attack vector then the one I assumed reading the title. I thought pip is compromised. Apparently not. This is social engineering, no?
slightwinder
11 hours ago
> This is social engineering, no?
Yes, this is probably spear phishing, a targeted attack.
grahamj
9 hours ago
Yeah from the title I wondered how the developers managed to get into the packages ;)