-= Per source details. Do not edit below this line.=-
This is a typosquatting/dependency confusion package that is part of a campaign embedding malicious code but was found before the malicious code was injected.
Packages in this campaign clone a legitimate library and add a hidden code that downloads a malicious script. The script then downloads an archive with malicious executable in the version appropriate to the system architecture, and ensures persistency by adding automatically started service entries. The remote code is a Go-based inforstealer and backdoor previously attributed to Nordkorean cybercrime activities. In this campaign, the malicious code is not immediately introduced in the typosquatted package, but added with an update.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-01-gztensor-cli
Reasons (based on the campaign):
crypto-related
action-hidden-in-lib-usage
Downloads and executes a remote executable.
clones-real-package
peristence-autorun
typosquatting
obfuscation
backdoor
infostealer
{
"iocs": {
"domains": [
"bitensor.xyz",
"cameradriver.pro"
],
"ips": [
"23.227.203.99"
],
"urls": [
"https://bitensor.xyz/realtek.sh"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2026-01-gztensor-cli/lium-4-96",
"sha256": "f30524e8a9ff2b7c5b43b57ea582beeba9d8f94da4097ecd572d26b4177e6626",
"source": "kam193",
"versions": [
"0.0.3"
],
"modified_time": "2026-01-05T17:34:51.092459Z",
"import_time": "2026-01-05T17:40:51.669480942Z"
}
]
}