-= Per source details. Do not edit below this line.=-
osint packages promise to be OSINT tool, however, when providing the username to search for, the package attempts to exfiltrate Discord tokens from the user.
The original package suggests being a library for Discord exfiltration, what is suspicious on its own, but in addition, the entry point located in main.py exfiltrate local Discord tokens to a hardcoded webhook.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2024-09-discord-token-lib
Reasons (based on the campaign):
exfiltration-generic
action-hidden-in-lib-usage
{
"iocs": {
"urls": [
"https://discord.com/api/webhooks/1271645951026659339/wWCSAlPG3TuhycH7ex6h9O48nKdFn4G55WUk4-lgay4RQTpCbbt-DYuo9jLIHYEReQKj"
]
},
"malicious-packages-origins": [
{
"sha256": "a16f42bf80d4ad7d1b19cd1d5edbd1c4147f559f76c5c41a00adf1d605e1868d",
"import_time": "2025-12-02T22:30:55.10468133Z",
"modified_time": "2024-10-02T07:55:07Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"id": "pypi/2024-09-discord-token-lib/discord-token-lib",
"source": "kam193"
},
{
"sha256": "44f591d196b048c4cad8da1cc1399681e22a2d5786fb212fda7c920aed8c2b07",
"import_time": "2025-12-02T23:07:18.116173543Z",
"modified_time": "2024-10-02T07:55:07Z",
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
],
"id": "pypi/2024-09-discord-token-lib/discord-token-lib",
"source": "kam193"
},
{
"sha256": "40da8c2a663c0510ae1ed1adf805fe279126849610f3327d58815867ffbcfcdf",
"import_time": "2025-12-10T21:38:57.400910729Z",
"modified_time": "2024-10-02T07:55:07Z",
"versions": [
"0.1"
],
"id": "pypi/2024-09-discord-token-lib/discord-token-lib",
"source": "kam193"
}
]
}