Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

async-substrate-interface-upgrade

Affected versions: (1) 1.5.17

  1. Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.

This is a typosquatting/dependency confusion package that is part of a campaign embedding malicious code but was found before the malicious code was injected.

Packages in this campaign clone a legitimate library and add a hidden code that downloads a malicious script. The script then downloads an archive with malicious executable in the version appropriate to the system architecture, and ensures persistency by adding automatically started service entries. The remote code is a Go-based inforstealer and backdoor previously attributed to Nordkorean cybercrime activities. In this campaign, the malicious code is not immediately introduced in the typosquatted package, but added with an update.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

Package clones a legitimate library and adds a hidden code that downloads a malicious script. The script then downloads an archive with malicious executable in the version appropriate to the system architecture, and ensures persistency by adding automatically started service entries. The remote code is a Go-based inforstealer and backdoor previously attributed to Northkorean cybercrime activities. In this campaign, the malicious code may not be immediately introduced in the typosquatted package, but added with an update.

See more details on the campaign page.

action-hidden-in-lib-usage

The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).

backdoor

Campaign targets backdoor.

clones_real_package

The package is a clone of a legitimate package or library, but with malicious code added.

crypto-related

Malicious activity is related to cryptocurrencies or blockchain, e.g. stealing crypto wallets.

infostealer

Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.

obfuscation

Code uses obfuscation techniques to hide its true purpose.

peristence_autorun

Campaign targets peristence_autorun.

remote_executable

Downloads and executes a remote executable.

typosquatting

The package name is an typosquatting variant of a popular package.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
  5. Service from Snyk, a cybersecurity company.