Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

requests-lite

Affected versions: (1) 2.32.3, 2.32.4, 2.32.5, 2.32.7

  1. Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

Clone of a legitimate requests library. The hidden code runs when using the requests functionality and starts a Telegram bot awaiting for remote commands.

See more details on the campaign page.

RAT

Malicious activity is typical for Remote Access Trojans (RATs).

abusing-3rd-api

Campaign targets abusing-3rd-api.

action-hidden-in-lib-usage

The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).

clones_real_package

The package is a clone of a legitimate package or library, but with malicious code added.

remote_commands

The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
  5. Service from Snyk, a cybersecurity company.