Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

sysfunc

Affected versions: (1) 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8

  1. Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

Importing the module starts downloading and executing an Infostealer targeting browsers' and Discord data

In first packages, there was a hidden line triggering downloading and running an infostealer

See more details on the campaign page.

action-hidden-in-lib-usage

The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).

exfiltration_browser_data

Campaign targets exfiltration_browser_data.

exfiltration_crypto

The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.

infostealer

Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.

infostealer:kiwi

Campaign targets infostealer:kiwi.

obfuscation

Code uses obfuscation techniques to hide its true purpose.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
  5. Service from Snyk, a cybersecurity company.