Cybersecurity

SSH Keys Stolen by Stream of Malicious PyPI and npm Packages

The attackers utilized typosquatting and code modifications to trick developers into installing malicious packages and continuously refined their techniques to evade detection.