MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
spellcheckers¶
Affected versions: unspecified (1)
- Version numbers are currently not tracked. Assume all versions are affected.
Package contains hidden code that is effectively run during importing and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute
See more details on the campaign page.
obfuscation
Campaign targets obfuscation.
remote_commands
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
remote_script
Downloads and executes a remote malicious script.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.