MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
user-random-agent-user¶
Affected versions: unspecified (1)
- Version numbers are currently not tracked. Assume all versions are affected.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
Inside the library there is a part running code hidden in the attached image, which then exfiltrate user-provided data, downloads and install next stage code, exfiltrate TXT files and finally installs infostealers - Lumma and a custom one. Arround L110
See more details on the campaign page.
action-hidden-in-lib-usage
Campaign targets action-hidden-in-lib-usage.
clipboard_stealing
Campaign targets clipboard_stealing.
clons_real_package
The package is a clone of a real package, but with malicious code added.
files_exfiltration
Campaign targets files_exfiltration.
infostealer
Campaign targets infostealer.
obfuscation
Campaign targets obfuscation.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.