Skip to content

MALICIOUS (1) package from Python Package Index.

  1. The campaign has clearly malicious intent, like infostealers.

xinference

Affected versions: (1) 2.6.0, 2.6.1, 2.6.2

  1. Version numbers are usually added automatically. In most cases, the packages listed here were created only to distribute malicious code.

Campaign data

Campaign information may not always be 100% accurate for every related package.

Campaign description

Following a malicious pull request that exfiltrated sensitive data from the CI runner, three malicious PyPI releases were published. Infected releases contain code typical for TeamPCP actions that exfiltrates all kinds of sensitive data (credentials, env variables, SSH keys, cloud tokens, configuration files, shell histories, cryptowallets, data from secret managers...). Malicious action activates during importing the main package's module.

See more details on the campaign page.

compromised-package

Campaign targets compromised-package.

exfiltration_cloud_tokens

Campaign targets exfiltration_cloud_tokens.

exfiltration_credentials

The package attempts to steal credentials, like passwords or API keys.

exfiltration_crypto

The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.

exfiltration_env_variables

Campaign targets exfiltration_env_variables.

exfiltration_ssh_keys

Campaign targets exfiltration_ssh_keys.

obfuscation

Code uses obfuscation techniques to hide its true purpose.

Look up in other services

  1. May not be available. See more in pypi-json-data repository.
  2. Open Source Insights project, provided by Google.
  3. Service from Socket.dev, a cybersecurity company.
  4. Spectra Assure Community, a service from ReversingLabs, a cybersecurity company.
  5. Service from Snyk, a cybersecurity company.