MacOS devices are being targeted with a PyPI backdoor to sneak into corporate networks

Security researchers have discovered a new campaign that attempts to gain access to corporate networks by targeting macOS devices and applying PyPI impersonation/typosquatting and steganography to compromise the endpoints.

Phylum researchers, who first observed the attack, have created unnamed threat actors that appear to be a fork of the ‘requests’ library on the Python Package Index (PyPI).