-= Per source details. Do not edit below this line.=-
When using the package, the given AWS credentials are silently exfiltrated to a hardcoded location. This incarnation of the long-running campaign was first flagged by OpenSourceMalware https://opensourcemalware.com/pypi/amazon-boto
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-08-aws-enumerate
Reasons (based on the campaign):
exfiltration-generic
action-hidden-in-lib-usage
exfiltration-credentials
{
"iocs": {
"domains": [
"api.aliyun-sdk-requests.xyz",
"aliyun-sdk-requests.xyz"
],
"urls": [
"https://api.aliyun-sdk-requests.xyz/aws",
"https://github.com/kohlersbtuh15/accesskey_tools"
]
},
"malicious-packages-origins": [
{
"source": "kam193",
"modified_time": "2026-04-29T08:58:04.515619Z",
"sha256": "649bb559f3078565515a9fee16dbe78e0d1b5575943cbaf020135f8e70e2f17d",
"import_time": "2026-04-29T10:16:34.855312319Z",
"versions": [
"1.42.41",
"1.42.42"
],
"id": "pypi/2025-08-aws-enumerate/amazon-boto"
}
]
}