VYPR

pypi · Malicious package advisory

Malware

textwrap-toolkit

MAL-2026-3407

Malicious code in textwrap-toolkit (PyPI)

Details


---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (029e190fc99763d65a096339b29fa85aeb0a23c3818a632a2dd4dc99f3e8fd64)
During installation, obfuscated code exfiltrates cryptocurrency wallet data to a hardcoded location and places a backdoor through a new authorized SSH key. Information about the placed backdoor is sent back to the attacker, and sshd configuration is adjusted to ensure the successful remote connection.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-ninja-core-utils


Reasons (based on the campaign):


 - The package overrides the install command in setup.py to execute malicious code during installation.


 - obfuscation


 - crypto-related


 - exfiltration-crypto


 - backdoor

Compromised versions (1)

  • 1.2.2

Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.