Skip to content

PROBABLY_PENTEST (1) campaign cataloged at 2024-10-01(2).

  1. Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.
  2. This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.

2024-09-old-google-play-store

This is a copy of https://pypi.org/project/play-scraper/ with added a very questionable "telemetry": in scraper.py, L90 sends the user hostname, IP and the exact local ID of scraped application to the package author.

Abuse categories

action-hidden-in-lib-usage

The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).

basic_exfiltration

The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

clones_real_package

The package is a clone of a legitimate package or library, but with malicious code added.

dependency-confusion

An attempt to exploit dependency confusion

URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.

  • aliniami.atwebpages.com

  • hxxp://aliniami.atwebpages.com/google.php

Packages in the campaign

campaign:2024-09-old-google-play-store