Particle.news

Download on the App Store

PSF Warns of Fake PyPI Login Site, Urges Immediate Password Resets

Phishing emails route maintainers to pypi-mirror.org, creating a supply-chain risk if compromised accounts are used to alter or upload packages.

Overview

  • Emails threaten account suspension and prompt users to “verify their email address,” directing them to the spoofed domain pypi-mirror.org that is not run by PyPI or the PSF.
  • PSF instructs anyone who submitted credentials to change their PyPI password immediately, review their Security History, and report suspicious activity to [email protected].
  • Stolen maintainer logins could let attackers modify trusted releases or publish new malicious packages that propagate to downstream users and CI systems.
  • Security guidance highlights phishing-resistant 2FA with hardware keys, password managers that only auto-fill on verified domains, and enterprise privileged access management.
  • The campaign follows a July lure using pypj.org, with PyPI maintainers pursuing registrar and CDN takedowns, submitting domains to browser blocklists, exploring stronger 2FA, and confirming GhostAction-stolen tokens were invalidated without being used to publish malware.