← Supply-Chain Attack Compendium

exotel

Incident Summary

exotel PyPI package compromised via phishing.

The PyPI account for the exotel package maintainer was compromised during the JuiceLedger phishing campaign. Attackers uploaded version 0.1.6 with installation code that downloaded and executed infostealer malware, making a niche Python client a clean-looking vessel for credential theft across developer workstations.

Date
2022-08-01 to 2022-08-31
Category
Open Source
Target Surface
Package registry
Insertion Phase
distribution
Impact
Data Exfiltration
Cause
Compromised Account/Credentials

What Was Affected

Package exotel
LanguagePython
ComponentLibrary
Artifact typesource archive
Domain typepackage host
Domain pypi.org

Compromised Versions

Incident Context

Motive
Credential Theft
Attribution
Cybercriminal Gang
Transitive
No
User Impact
480000
Observed Duration
30 days

Evidence

Compromised Artifacts

Current Artifacts and Analysis

Indicators and Changes

Hashes

  • sha256:fbb13333b05eaab13d5d4810f92dbd5dfc4c25cf14e4471c6352b046c6653b6f
  • sha256:60434af3ebe924efabc96558e6c8d8176bf4eb06dd6cc47b4c491da9964be874
  • sha256:8e97c6883e7af5cc1f88ac03197d62298906ac4a35a789d94cc9fde45ee7ea13

External References

Source Data

Source record: oss/exotel/meta.yaml