Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

backtradingbot

Affected versions: unspecified (1)

  1. Version numbers are currently not tracked. Assume all versions are affected.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

Running the installed entry point downloads and executes remote code. During the analysis, the code was switching to websockets, adding a startup script and downloading next stages, which finally looked for browser and crypto wallet data. Currently, they seem not to attempt exfiltration of very sensitive data but rather a presence of different webbrowsers and wallets.

It uses the same remote domain as campaign 2025-07-db-indicator, but significantly different payload.

See more details on the campaign page.

basic_exfiltration

The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

crypto-related

Campaign targets crypto-related.

exfiltration_browser_data

Campaign targets exfiltration_browser_data.

peristence_autorun

Campaign targets peristence_autorun.

remote_script

Downloads and executes a remote malicious script.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.