pypi · Malicious package advisory
Malwaretxwrap
MAL-2026-3619
Malicious code in txwrap (PyPI)
Details
--- _-= Per source details. Do not edit below this line.=-_ ## Source: kam193 (72b4db77d156fffbfdf3253cda39d73180fda419676d356fdbc217130c289549) During importing, the remote code is downloaded. It then exfiltrates cryptocurrency wallet data to a hardcoded location and places a backdoor through a new authorized SSH key. Information about the placed backdoor is sent back to the attacker, and sshd configuration is adjusted to ensure the successful remote connection. --- Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers. Campaign: 2026-05-ninja-core-utils Reasons (based on the campaign): - backdoor - The package overrides the install command in setup.py to execute malicious code during installation. - obfuscation - crypto-related - exfiltration-crypto
Compromised versions (2)
- 1.0.0
- 1.0.1
Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.