MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
backtradingbot¶
Affected versions: (1) 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5
- Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
Running the installed entry point downloads and executes remote code. During the analysis, the code was switching to websockets, adding a startup script and downloading next stages, which finally looked for browser and crypto wallet data. Currently, they seem not to attempt exfiltration of very sensitive data but rather a presence of different webbrowsers and wallets.
It uses the same remote domain as campaign 2025-07-db-indicator, but significantly different payload.
See more details on the campaign page.
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
crypto-related
Malicious activity is related to cryptocurrencies or blockchain, e.g. stealing crypto wallets.
exfiltration_browser_data
Campaign targets exfiltration_browser_data.
peristence_autorun
Campaign targets peristence_autorun.
remote_script
Downloads and executes a remote malicious script.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- Search for the package in Snyk Advisor (5)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
- Service from Snyk, a cybersecurity company.