Cybercriminals Exploit PyPI Packages to Target Instagram and TikTok Accounts
- John Jordan
- 4 hours ago
- 2 min read
Recent investigations have revealed that cybercriminals are exploiting malicious packages on the Python Package Index (PyPI) to validate stolen user accounts on popular social media platforms, Instagram and TikTok. These packages automate the process of checking whether email addresses are linked to active accounts, posing significant risks to user security.

Key Takeaways
Three malicious packages identified: checker-SaGaF, steinlurks, and sinnercore.
These packages have collectively garnered over 7,000 downloads before being removed from PyPI.
The tools validate email addresses against TikTok and Instagram APIs, enabling further cyber attacks.
Threat actors can use validated accounts for credential stuffing, doxxing, and selling data on the dark web.
Overview of Malicious Packages
Security researchers from Socket have uncovered three malicious packages that were uploaded to PyPI, designed specifically to exploit the APIs of TikTok and Instagram. The packages are:
checker-SaGaF: This package checks if an email is associated with TikTok and Instagram accounts by sending HTTP POST requests to their password recovery and login endpoints.
steinlurks: Similar to checker-SaGaF, this package targets Instagram accounts, using forged requests to evade detection and validate email addresses.
sinnercore: This package triggers the password reset flow for Instagram accounts, potentially harassing victims while gathering account data.
The Threat Landscape
The exploitation of these packages highlights a broader issue in cybersecurity, particularly concerning the vulnerabilities of APIs. By confirming the existence of accounts, cybercriminals can initiate various attacks, including:
Credential Stuffing: Using validated credentials to gain unauthorized access to accounts.
Doxxing: Threatening to expose personal information of users.
Spam and Fake Reports: Conducting attacks that could lead to account suspension.
The validated user lists generated by these tools can be sold on the dark web for profit, with prices as low as $300 for 100,000 verified emails. This underscores the scale and accessibility of these threats, making it easier for attackers to target known-valid accounts.
Implications for Users and Developers
The findings serve as a wake-up call for both users and developers. Users are advised to:
Regularly update passwords and enable two-factor authentication.
Be vigilant about suspicious activities on their accounts.
Developers should:
Scrutinize API responses to avoid inadvertently exposing sensitive information.
Utilize tools that can detect risky dependencies in real-time to mitigate supply chain security risks.
As cybercriminals continue to refine their tactics, the need for heightened awareness and proactive measures in cybersecurity becomes increasingly critical. The exploitation of PyPI packages to validate stolen accounts is a stark reminder of the vulnerabilities that exist within popular platforms and the importance of safeguarding personal information against such automated threats.
As cyber threats become increasingly sophisticated, your security strategy must evolve to keep pace. BetterWorld Technology offers adaptive cybersecurity solutions that grow with the threat landscape, helping your business stay secure while continuing to innovate. Reach out today to schedule your personalized consultation.
Sources
Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials, GBHackers News.
Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts, The Hacker News.
Instagram and TikTok accounts are being stolen using malicious PyPI packages, TechRadar.