Malicious Python Packages Hijacking Open‑Source Repos: The Banana Squad Threat

Security researchers at ReversingLabs have uncovered a coordinated campaign by the “Banana Squad” that injects malicious Python toolkits into hundreds of seemingly legitimate open‑source GitHub repositories, using domain squatting, repository impersonation, and hidden code obfuscation to steal sensitive data and evade detection.

21CTO
21CTO
21CTO
Malicious Python Packages Hijacking Open‑Source Repos: The Banana Squad Threat

ReversingLabs’ chief malware researcher Robert Simmons warns that a threat group known as “Banana Squad” has been active since April 2023, targeting over 60 GitHub repositories with large‑scale trojan attacks that embed Python‑based hacker toolkits.

The group creates malicious public repositories that mimic popular hacking tools, appearing legitimate while containing hidden backdoor logic. These repositories are discovered through reverse‑engineered threat‑intel URLs and exhibit characteristics such as domain squatting, repository impersonation, and the use of emojis suggesting AI involvement.

In total, 67 compromised repositories were found, each disguised as useful utilities (e.g., credential grabbers, vulnerability scanners). The malicious code is often hidden among long strings, whitespace, or off‑screen regions, making it difficult to spot without tools like Spectra Analyze’s preview feature.

Banana Squad has previously published hundreds of malicious packages for Windows, PyPI, and npm, stealing system details and cryptocurrency wallets. One package downloaded roughly 75,000 times before removal in April 2024.

Researchers note that many malicious repositories have a single repository listed under a fabricated GitHub account, indicating fake accounts created solely to host malicious code. Repository names often duplicate legitimate projects, and descriptions are filled with relevant keywords and fire or rocket emojis.

ReversingLabs provides a list of 67 indicators of compromise (IOCs) – domain URLs, filenames, and repository tags – to help developers verify the integrity of dependencies. Developers are urged to repeatedly audit repositories and compare them against known good versions to avoid supply‑chain attacks.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

GitHubsoftware supply chainopen source securitymalicious Python packagesReversingLabs
21CTO
Written by

21CTO

21CTO (21CTO.com) offers developers community, training, and services, making it your go‑to learning and service platform.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.