Malicious PyPI Package Exploited Deezer's API, Orchestrates a Distributed Piracy Operation

A malicious PyPi package effectively turned its users' systems "into an illicit network for facilitating bulk music downloads," writes The Hacker News.

Though the package has been removed from PyPI, researchers at security platform Socket.dev say it enabled "coordinated, unauthorized music downloads from Deezer — a popular streaming service founded in France in 2007."

Although automslc, which has been downloaded over 100,000 times, purports to offer music automation and metadata retrieval, it covertly bypasses Deezer's access restrictions... The package is designed to log into Deezer, harvest track metadata, request full-length streaming URLs, and download complete audio files in clear violation of Deezer's API terms... [I]t orchestrates a distributed piracy operation by leveraging both user-supplied and hardcoded Deezer credentials to create sessions with Deezer's API. This approach enables full access to track metadata and the decryption tokens required to generate full-length track URLs.

Additionally, the package routinely communicates with a remote server... to update download statuses and submit metadata, thereby centralizing control and allowing the threat actor to monitor and coordinate the distributed downloading operation. In doing so, automslc exposes critical track details — including Deezer IDs, International Standard Recording Codes, track titles, and internal tokens like MD5_ORIGIN (a hash used in generating decryption URLs) — which, when collected en masse, can be used to reassemble full track URLs and facilitate unauthorized downloads...

Even if a user pays for access to the service, the content is licensed, not owned. The automslc package circumvents licensing restrictions by enabling downloads and potential redistribution, which is outside the bounds of fair use...

"The malicious package was initially published in 2019, and its popularity (over 100,000 downloads) indicates wide distribution..."

">

">

https://yro.slashdot.org/story/25/03/02/064255/malicious-pypi-package-exploited-deezers-api-orchestrates-a-distributed-piracy-operation?utm_source=rss1.0moreanon&utm_medium=feed

at Slashdot.

https://yro.slashdot.org/story/25/03/02/064255/malicious-pypi-package-exploited-deezers-api-orchestrates-a-distributed-piracy-operation?utm_source=rss1.0mainlinkanon&utm_medium=feed

Reply to this note

Please Login to reply.

Discussion

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction

* Location tracking

* Being blackmailed-we will trace the source and the person behind it-

CONTACT On

* EMAIL: conleyjbeespy606@gmail.com

* Telegram - +44 7456 058620

* Instagram- JBEE SPY TEAM

Explain what you want and go straight to the point. Make available TARGETS DETAILS.

And simplv start monitorina the device.