Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
嗯,用户让我用中文帮他总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,抓住主要信息。 文章讲的是Python包管理器PyPI中发现了两个恶意包,伪装成拼写检查器,实际上包含远程访问木马的功能。这两个包已经被下架了,但下载量有1000多次。攻击者通过隐藏在Basque语言字典文件中的Base64编码ayload来下载RAT。此外,还提到了类似的恶意包和供应链安全的问题。 接下来,我需要把这些信息浓缩到100字以内。要突出关键点:恶意包、伪装、RAT、下载量、隐藏方式、其他攻击案例以及供应链安全问题。 可能会这样组织句子:“Python包管理器PyPI发现两个伪装成拼写检查器的恶意包,包含远程访问木马功能。这些包已下架,但被下载超千次。攻击者隐藏恶意代码于Basque字典文件中,并通过触发器执行。此外,还发现其他恶意npm包和供应链安全威胁。” 这样既涵盖了主要信息,又符合字数限制。 最后检查一下有没有遗漏的重要点,比如攻击者的策略变化和类似案例的关联。确保总结准确且简洁。 </think> Python包管理器PyPI发现两个伪装成拼写检查器的恶意包,包含远程访问木马功能。这些包已下架,但被下载超千次。攻击者隐藏恶意代码于Basque字典文件中,并通过触发器执行。此外,还发现其他恶意npm包和供应链安全威胁。 2026-1-28 09:30:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Supply Chain Security / Malware

Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT).

The packages, named spellcheckerpy and spellcheckpy, are no longer available for download, but not before they were collectively downloaded a little over 1,000 times.

"Hidden inside the Basque language dictionary file was a base64-encoded payload that downloads a full-featured Python RAT," Aikido researcher Charlie Eriksen said. "The attacker published three 'dormant' versions first, payload present, trigger absent, then flipped the switch with spellcheckpy v1.2.0, adding an obfuscated execution trigger that fires the moment you import SpellChecker."

Unlike other packages that conceal the malicious functionality within "__init__.py" scripts, the threat actor behind the campaign has been found to add the payload inside a file named "resources/eu.json.gz" that contains Basque word frequencies from the legitimate pyspellchecker package.

Cybersecurity

While the function looks straightforward and harmless, the malicious behavior is triggered when the archive file is extracted using the test_file() function with the parameters: test_file("eu", "utf-8", "spellchecker"), causing it to retrieve a Base64-encoded downloader hidden in the dictionary under a key called "spellchecker."

Interestingly, the first three versions of the package only fetched and decoded the payload, but never executed it. However, that changed with the release of spellcheckpy version 1.2.0, published on January 21, 2026, when it gained the ability to run the payload as well.

The first stage is a downloader that's designed to retrieve a Python-based RAT from an external domain ("updatenet[.]work"). It's capable of fingerprinting the compromised host, parsing incoming commands, and executing them. The domain, registered in late October 2025, is associated with 172.86.73[.]139, an IP address managed by RouterHosting LLC (aka Cloudzy), a hosting provider that has a history of offering its services to nation-state groups.

This is not the first time fake Python spell-checking tools have been detected in PyPI. In November 2025, HelixGuard said it discovered a malicious package named "spellcheckers" that featured the ability to retrieve and execute a RAT payload. It's suspected that these two sets of attacks are the work of the same threat actor.

The development coincides with the discovery of several malicious npm packages to facilitate data theft and target cryptocurrency wallets -

  • flockiali (1.2.3-1.2.6), opresc (1.0.0), prndn (1.0.0), oprnm (1.0.0), and operni, which contain a single JavaScript file that, when loaded, serves a fake Microsoft-branded login screen as part of a targeted spear-phishing campaign hitting employees at specific industrial and energy companies located in France, Germany, Spain, the U.A.E, and the U.S. with malicious links
  • ansi-universal-ui (1.3.5, 1.3.6, 1.3.7, 1.4.0, 1.4.1), which masquerades as a UI component library but deploys a Python-based stealer dubbed G_Wagon that exfiltrates web browser credentials, cryptocurrency wallets, cloud credentials, and Discord tokens to an Appwrite storage bucket

Cybersecurity

The disclosure also comes as Aikido highlighted the threat associated with slopsquatting, wherein artificial intelligence (AI)-powered agents can hallucinate non-existent packages that could then be claimed by a threat actor to push malicious code to downstream users.

In one case highlighted by the supply chain security company, it has been found that a fictitious npm package named "react-codeshift" is referenced by 237 GitHub repositories since it was made up of a large language model in mid-October 2025, with some of them even instructing AI agents to install it.

"How did it spread to 237 repos? Agent skill files. Copy-pasted, forked, translated into Japanese, never once verified," Eriksen said. "Skills are the new code. They don't look like it. They're Markdown and YAML and friendly instructions. But they're executable. AI agents follow them without asking, 'Does this package actually exist?'"

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/fake-python-spellchecker-packages-on.html
如有侵权请联系:admin#unsafe.sh