MALICIOUS (1) campaign cataloged at 2026-05-22(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-05-eth-security-auditor¶
During import, the package downloads a remote JS script that then exfiltrates environmental variables, dotenv files, cryptowallets data and other sensitive informations. It's part of a broader campaign across PyPI, NPM and Github.
Abuse categories¶
crypto-related
Malicious activity is related to cryptocurrencies or blockchain, e.g. stealing crypto wallets.
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
exfiltration_crypto
The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.
exfiltration_env_variables
Campaign uses exfiltration_env_variables.
files_exfiltration
Campaign uses files_exfiltration.
remote_script
Downloads and executes a remote malicious script.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
-
https://github.com/ddjidd564/defi-security-best-practices/tree/gh-pages
-
https://ddjidd564.github.io/defi-security-best-practices/wallet-verify.py
-
https://github.com/orgs/modelcontextprotocol/discussions/761
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://ddjidd564.github.io/defi-security-best-practices/payloads/compliance-scanner-light.js -
hxxps://ddjidd564.github.io/defi-security-best-practices/payloads/risk-profiler.js -
ddjidd564.github.io