Skip to content

Commit a1ecd93

Browse files
authored
Merge branch 'main' into proxy-protection
2 parents cb345a8 + c82e977 commit a1ecd93

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: PyPI Users Email Phishing Attack
3+
description: PyPI Users are receiving emails detailing them to log in to a fake PyPI site.
4+
authors:
5+
- miketheman
6+
date: 2025-07-28
7+
tags:
8+
- security
9+
- transparency
10+
---
11+
(Ongoing, preliminary report)
12+
13+
PyPI has not been hacked, but users are being targeted by a phishing attack
14+
that attempts to trick them into logging in to a fake PyPI site.
15+
16+
Over the past few days, users who have published projects on PyPI
17+
with their email in package metadata may have received an email titled:
18+
19+
> [PyPI] Email verification
20+
21+
from the email address `[email protected]`.
22+
23+
Note the lowercase `j` in the domain name,
24+
which is not the official PyPI domain, `pypi.org`.
25+
26+
This is not a security breach of PyPI itself,
27+
but rather a phishing attempt that exploits the trust users have in PyPI.
28+
29+
<!-- more -->
30+
31+
The email instructs users to follow a link to verify their email address,
32+
which leads to a phishing site that looks like PyPI but is not the official site.
33+
34+
The user is prompted to log in, and the requests are passed back to PyPI, which may lead to the user
35+
believing they have logged in to PyPI, but in reality, they have provided their credentials
36+
to the phishing site.
37+
38+
PyPI Admins are looking into a few methods of handling this attack,
39+
and want to make sure users are aware of the phishing attempt
40+
while we investigate different options.
41+
42+
There is currently a banner on the PyPI homepage
43+
to warn users about this phishing attempt.
44+
45+
Always inspect the URL in the browser before logging in.
46+
47+
We are also waiting for CDN providers and name registrars
48+
to respond to the trademark and abuse notifications
49+
we have sent them regarding the phishing site.
50+
51+
If you have received this email, do not click on any links or provide any information.
52+
Instead, delete the email immediately.
53+
54+
If you have already clicked on the link and provided your credentials,
55+
we recommend changing your password on PyPI immediately.
56+
Inspect your account's Security History for anything unexpected.

0 commit comments

Comments
 (0)