Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

mylib-utils

Affected versions: (1) 1.0.0, 1.0.1

  1. Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

During import, a remote executable is automatically started. During analysis, the executable only showed a basic message. It's likely experimenting with malicious techniques to prepare for real malicious action.

See more details on the campaign page.

override_install

The package overrides the install command in setup.py to execute malicious code during installation.

remote_executable

Downloads and executes a remote executable.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
  5. Service from Snyk, a cybersecurity company.