As a security expert, you've been called in to investigate a mysterious breach of the PyPI package index. Your task is to navigate complex security protocols and follow the trails of breadcrumbs left by the mysterious hacker. Can you catch the culprit before they do lasting damage?