Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious PyPI package impersonates SymPy and deploys XMRig Miner to Linux hosts
Identity

Malicious PyPI package impersonates SymPy and deploys XMRig Miner to Linux hosts

userBy userJanuary 22, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananJanuary 22, 2026Cryptojacking/Malware

A new malicious package discovered in the Python Package Index (PyPI) was found to impersonate a popular symbolic mathematics library and deploy a malicious payload, including a cryptocurrency miner, to Linux hosts.

The package, named sympy-dev, mimics SymPy and copies SymPy’s project description exactly in an attempt to trick unsuspecting users into thinking they are downloading a “development version” of the library. It was first published on January 17, 2026 and has since been downloaded over 1,100 times.

While download numbers are not a reliable metric for measuring infection numbers, this number may suggest that some developers may have fallen victim to a malicious campaign. This package is still available for download at the time of writing.

According to Socket, the original library has been modified to act as a downloader for the XMRig cryptocurrency miner on compromised systems. This malicious behavior is designed to be unnoticeable and to only be triggered when a specific polynomial routine is called.

cyber security

“Once the backdoor functionality is invoked, it retrieves a remote JSON configuration, downloads an attacker-controlled ELF payload, and executes it from an anonymous memory-backed file descriptor using Linux memfd_create and /proc/self/fd. This reduces on-disk artifacts,” security researcher Kirill Boychenko said in an analysis Wednesday.

The modified function is used to run the downloader and retrieve the remote JSON configuration and ELF payload from ‘63.250.56’.[.]54″ and launches the ELF binary and configuration directly into memory to avoid leaving any artifacts on disk. This technique was previously employed in cryptojacking campaigns organized by FritzFrog and Mimo.

The ultimate goal of the attack is to download two Linux ELF binaries designed to mine cryptocurrencies using XMRig on Linux hosts.

“Both captured configurations use an XMRig-compatible schema that enables CPU mining, disables the GPU backend, and directs miners to Stratum via a TLS endpoint on port 3333 hosted on an IP address controlled by the same threat actor,” Socket said.

“While cryptomining was observed in this campaign, the Python implant acts as a general-purpose loader that can fetch and execute arbitrary second-stage code under the privileges of the Python process.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSmarterMail authentication bypass exploited 2 days after patch release
Next Article Shaping the supply chain of the future
user
  • Website

Related Posts

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

January 27, 2026

ClickFix attack spreads using fake CAPTCHAs, Microsoft Scripts, and trusted web services

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Android smartphones are getting more anti-theft features

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.