PyPI repository got rid of 11 packages that were stealing Discord tokens and passwords

PyPI got rid of 11 packages
Written by Emma Davis

The official Python Package Index (PyPI) repository got rid of 11 malicious packages that stole user data (including Discord tokens and passwords) and installed shells on victims’ systems (for remote access by attackers).

In total, the packages have been downloaded and installed over 30,000 times, according to DevOps JFrog, who discovered this set of malicious libraries.

Almost all libraries were developed by different authors, as each of them demonstrated different malicious behaviour and extracted data from infected machines in its own way:

  1. Importantpackage (downloaded 6305 times) and important-package (downloaded 12,897 times): hidden connectback shell for using the trevorc2 client;
  2. pptest (downloaded 10,001 times): used DNS to send hostname + ‘|’ + os.getcwd () + ‘|’ + str (self.get_wan_ip ()) + ‘|’ + local_ip_str;
  3. ipboards (downloaded 946 times): dependency confusion, sent user data (username, hostname) via DNS tunneling to;
  4. owlmoon (uploaded 3285 times): a Trojan stealing Discord tokens, tokens were sent to Qs7hpsymbwaDlZ3
  5. DiscordSafety (uploaded 557 times): Trojan stealing Discord tokens, tokens were sent to;
  6. Trrfab (downloaded 287 times): dependency confusion, sent user data (id, hostname as well as / etc / passwd, / etc / hosts and / home) to;
  7. 10Cent10 (downloaded 490 times) and 10Cent11 (downloaded 490 times): connectback shell with hard-coded address;
  8. yandex-yt (downloaded 4183 times): prints pwned messages and points to a possibly malicious domain at;
  9. yiffparty (uploaded 1859 times): a Trojan stealing Discord tokens, tokens were sent to Qs7hpsymbwaDlZ6-RiBlUBlUBl_Qs7hpsyqwaDlZR3HiRiRu

Thus, 10 out of 11 packages were openly malicious, while the yandex-yt library could be some kind of test or a joke, although it could also turn into a malware delivery channel.

The researchers also emphasize that the two packages abused the relatively new dependency confusion technique. That is, attackers registered packages with names that could be used inside closed corporate networks, hoping that their package would be used after the corporate package was removed (if the dependency tree was not updated).

Let me also remind you that we talked about the Spammers attack PyPI and GitLab repositories.

User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply