MALICIOUS (1) package from Python Package Index.
- The campaign has clearly malicious intent, like infostealers.
vtk-osmesa¶
Affected versions: (1) 0.0.7, 9.0.1, 900.548.725, 900.548.726, 900.548.731, 900.548.733, 900.548.734, 900.548.735, 900.548.736, 900.548.739, 900.548.742, 900.548.744, 900.548.746, 900.548.747, 900.548.751, 900.548.752
- Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.
Campaign data¶
Campaign information may not always be 100% accurate for every related package.
Campaign description
During the installation, sensitive information are exfiltrated (incl. env variables)
See more details on the campaign page.
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
exfiltration_env_variables
Campaign targets exfiltration_env_variables.
override_install
The package overrides the install command in setup.py to execute malicious code during installation.
Look up in other services¶
- Check metadata in pypi-data project (1)
- Search for the package in deps.dev(2)
- Search for the package in socket.dev (3)
- Search for the package in secure.software (4)
- Search for the package in Snyk Advisor (5)
- May not be available. See more in pypi-json-data repository.
- Open Source Insights project, provided by Google.
- Service from Socket.dev, a cybersecurity company.
- Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
- Service from Snyk, a cybersecurity company.