MALICIOUS (1) campaign cataloged at 2026-03-03(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-02-urllib-slim¶
During installation, the package starts obfuscated code that downloads and runs remote executables in specific environments - in older packages - attempts to exfiltrate some basic information using DNS requests and then likely cover tracks by installing a similarly named package from private repository
Abuse categories¶
dependency-confusion
An attempt to exploit dependency confusion
obfuscation
Code uses obfuscation techniques to hide its true purpose.
remote_executable
Downloads and executes a remote executable.
typosquatting
The package name is an typosquatting variant of a popular package.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://storage.googleapis.com/py-pi/python_mac -
hxxps://storage.googleapis.com/py-pi/python_rhel -
hxxps://storage.googleapis.com/py-pi/python_win -
1r.vc -
i.1r.vc