-= Per source details. Do not edit below this line.=-
In specific environments, during installation, the package attempts to exfiltrate some basic information using DNS requests and then cover tracks by installing a similarly named package from the local private repository
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-02-urllib-slim
Reasons (based on the campaign):
typosquatting
Downloads and executes a remote executable.
obfuscation
dependency-confusion
{
"iocs": {
"domains": [
"1r.vc",
"i.1r.vc"
],
"urls": [
"https://storage.googleapis.com/py-pi/python_mac",
"https://storage.googleapis.com/py-pi/python_rhel",
"https://storage.googleapis.com/py-pi/python_win"
]
},
"malicious-packages-origins": [
{
"versions": [
"3.9.12"
],
"sha256": "21f201c2aada618cb80f926b029f6b83b3f3bd9ffd0b35d5a4bb0c3aa1afd792",
"id": "pypi/2026-02-urllib-slim/financial-crimes-general-utils",
"import_time": "2026-03-23T14:29:23.857828701Z",
"modified_time": "2026-03-23T13:56:01.921236Z",
"source": "kam193"
},
{
"versions": [
"3.9.12"
],
"sha256": "0a25418866ddab42755c1e981f2db0a0b6a8f49fc0635ee981ee6c36dff35b09",
"id": "pypi/2026-02-urllib-slim/financial-crimes-general-utils",
"import_time": "2026-03-23T20:16:57.84683842Z",
"modified_time": "2026-03-23T13:56:01.921236Z",
"source": "kam193"
}
]
}