MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
utf-cleaner¶
Affected versions: (1) 3.3.7, 3.3.8, 3.3.9, 3.4.0, 3.4.1, 3.4.2
- Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
During import, the package silently downloads and executes remote code. This code starts a web server in the separate process and listens for commands to execute from a C2 server, as well as periodically sends a beacon to C2 allowing discovery and finishing execution.
This package is closely related to Github repository https://github.com/xcummins/tg-outline-seller/ from the same author, where it's used as dependency effectively compromising its users.
See more details on the campaign page.
remote_commands
The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
remote_script
Downloads and executes a remote malicious script.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- Search for the package in Snyk Advisor (5)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
- Service from Snyk, a cybersecurity company.