- Cyber Syrup
- Posts
- Malicious Python Package Targets Solana Developers in Latest Supply Chain Threat
Malicious Python Package Targets Solana Developers in Latest Supply Chain Threat
Cybersecurity researchers have identified a malicious software package on the Python Package Index (PyPI) that masqueraded as a legitimate Solana blockchain utility

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Learn AI in 5 minutes a day
This is the easiest way for a busy person wanting to learn AI in as little time as possible:
Sign up for The Rundown AI newsletter
They send you 5-minute email updates on the latest AI news and how to use it
You learn how to become 2x more productive by leveraging AI
Malicious Python Package Targets Solana Developers in Latest Supply Chain Threat

Cybersecurity researchers have identified a malicious software package on the Python Package Index (PyPI) that masqueraded as a legitimate Solana blockchain utility. The package, named solana-token
, was engineered to steal source code and developer secrets from infected systems.
Although the package has since been removed from PyPI, it was downloaded 761 times before its removal, highlighting the ongoing risks associated with open-source repositories.
Discovery and Functionality
The malicious package was first uploaded in early April 2024, using a versioning scheme that differed significantly from conventional package numbering. This tactic may have been used to avoid detection or raise curiosity among developers.
According to ReversingLabs researcher Karlo Zanki, when the package was installed, it executed a function deceptively named register_node()
that:
Scanned the Python execution environment
Copied all source code files
Exfiltrated them to a hard-coded IP address
The intention behind this design appears to be the theft of sensitive crypto-related data, such as private keys, API tokens, and configuration details, which developers often store locally during the initial development phases of blockchain or Web3 applications.
Target Audience and Distribution
Based on the package name and embedded functions, the threat actors were likely targeting developers working on Solana-based or custom blockchain solutions. While it remains unclear how users discovered the package, it's probable that it was promoted on developer-focused platforms, discussion forums, or even through social media channels relevant to cryptocurrency and Web3 development.
The attack highlights a common tactic in software supply chain threats: using realistic naming conventions to blend in with legitimate packages and appeal to unsuspecting developers.
The Broader Implications for Supply Chain Security
This incident underscores a persistent challenge in modern software development: the security of open-source ecosystems. With thousands of new packages being published daily across repositories like PyPI, npm, and others, malicious actors have increasingly exploited the trust-based nature of these platforms.
“Development teams need to aggressively monitor for suspicious activity or unexplained changes within both open source and commercial, third-party software modules,” Zanki noted. “By stopping malicious code before it is allowed to penetrate secure development environments, teams can prevent the kind of destructive supply chain attacks.”
The cryptocurrency sector remains one of the most lucrative targets for such attacks due to the direct financial incentives and the potential for compromising high-value wallets, smart contracts, and exchange platforms.
Recommendations for Developers
To mitigate the risks posed by malicious packages in open-source ecosystems, cybersecurity experts recommend:
Thoroughly vetting all third-party packages, especially newly published ones or those with limited downloads
Using software composition analysis (SCA) tools to scan dependencies for known vulnerabilities or malicious behavior
Isolating development environments to prevent sensitive data from being accessed during testing
Monitoring outbound connections from development machines for suspicious activity
Conclusion
The solana-token
package incident serves as a stark reminder of the importance of supply chain vigilance in software development. As threat actors continue to evolve their tactics, developers must adopt proactive security measures to safeguard their code, credentials, and users from malicious intrusion.