{"id":"MAL-2026-54","summary":"Malicious code in lium-4-96 (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (f30524e8a9ff2b7c5b43b57ea582beeba9d8f94da4097ecd572d26b4177e6626)\nThis is a typosquatting/dependency confusion package that is part of a campaign embedding malicious code but was found before the malicious code was injected.\n \nPackages in this campaign clone a legitimate library and add a hidden code that downloads a malicious script. The script then downloads an archive with malicious executable in the version appropriate to the system architecture, and ensures persistency by adding automatically started service entries. The remote code is a Go-based inforstealer and backdoor previously attributed to Nordkorean cybercrime activities. In this campaign, the malicious code is not immediately introduced in the typosquatted package, but added with an update.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-01-gztensor-cli\n\n\nReasons (based on the campaign):\n\n\n - crypto-related\n\n\n - action-hidden-in-lib-usage\n\n\n - Downloads and executes a remote executable.\n\n\n - clones-real-package\n\n\n - peristence-autorun\n\n\n - typosquatting\n\n\n - obfuscation\n\n\n - backdoor\n\n\n - infostealer\n","modified":"2026-01-05T18:02:55.464447Z","published":"2026-01-05T17:34:51Z","database_specific":{"iocs":{"domains":["bitensor.xyz","cameradriver.pro"],"urls":["https://bitensor.xyz/realtek.sh"],"ips":["23.227.203.99"]},"malicious-packages-origins":[{"modified_time":"2026-01-05T17:34:51.092459Z","import_time":"2026-01-05T17:40:51.669480942Z","source":"kam193","versions":["0.0.3"],"sha256":"f30524e8a9ff2b7c5b43b57ea582beeba9d8f94da4097ecd572d26b4177e6626","id":"pypi/2026-01-gztensor-cli/lium-4-96"}]},"references":[{"type":"WEB","url":"https://dmpdump.github.io/posts/NorthKorea_Backdoor_Stealer/"},{"type":"WEB","url":"https://www.virustotal.com/gui/file-analysis/NTk2Y2FiNTBmM2QxODI2NDRlZGM0OTA2OGVjYzUxOTk6MTc2NzYzMzkzMA=="},{"type":"EVIDENCE","url":"https://www.virustotal.com/gui/file/d02d6a5da3cff57d78e260961526420c172a46f4a07d18a3865fecbf5dfebc1d/detection"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/lium-4-96"}],"affected":[{"package":{"name":"lium-4-96","ecosystem":"PyPI","purl":"pkg:pypi/lium-4-96"},"versions":["0.0.3"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/lium-4-96/MAL-2026-54.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"}]}