MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
genz-translator¶
Affected versions: (1) 9000.0.1, 9001.0.1, 9002.0.1, 9003.0.1, 9004.0.1, 9005.0.1, 9006.0.1, 9007.0.1, 9008.0.1, 9009.0.1, 9010.0.1, 9011.0.1, 9012.0.1, 9013.0.1, 9014.0.1, 9015.0.1, 9016.0.1, 9017.0.1, 9018.0.1, 9019.0.1
- Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
Installing the package installs a reverse shell. As the mentioned domain doesn't seem to exist, it may be a test designed for an internal usage
See more details on the campaign page.
override_install
The package overrides the install command in setup.py to execute malicious code during installation.
revshell
The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- Search for the package in Snyk Advisor (5)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
- Service from Snyk, a cybersecurity company.