MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
heroku-tl¶
Affected versions: (1) 2.1.0, 2.1.1, 2.2.2, 2.5.0, 2.5.1, 2.6.0, 2.8.0, 2.9.0, 3.0.0, 3.0.1, 3.1.0, 3.2.0, 3.2.1, 3.2.2, 3.2.5
- Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
Clone of a legit Telegram client, with a hidden code that, under some conditions, can attempt to destroy the Linux OS.
See more details on the campaign page.
action-hidden-in-lib-usage
The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- Search for the package in Snyk Advisor (5)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
- Service from Snyk, a cybersecurity company.