Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts

Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts

Posted on January 22, 2026January 22, 2026 By CWS

Ravie LakshmananJan 22, 2026Cryptojacking / Malware
A brand new malicious package deal found within the Python Package deal Index (PyPI) has been discovered to impersonate a well-liked library for symbolic arithmetic to deploy malicious payloads, together with a cryptocurrency miner, on Linux hosts.
The package deal, named sympy-dev, mimics SymPy, replicating the latter’s mission description verbatim in an try to deceive unsuspecting customers into pondering that they’re downloading a “improvement model” of the library. It has been downloaded over 1,100 occasions because it was first printed on January 17, 2026.
Though the obtain rely shouldn’t be a dependable yardstick for measuring the variety of infections, the determine probably suggests some builders could have fallen sufferer to the malicious marketing campaign. The package deal stays out there for obtain as of writing.
In accordance with Socket, the unique library has been modified to behave as a downloader for an XMRig cryptocurrency miner on compromised programs. The malicious conduct is designed to set off solely when particular polynomial routines are known as in order to fly beneath the radar.

“When invoked, the backdoored features retrieve a distant JSON configuration, obtain a risk actor-controlled ELF payload, then execute it from an nameless memory-backed file descriptor utilizing Linux memfd_create and /proc/self/fd, which reduces on-disk artifacts,” safety researcher Kirill Boychenko stated in a Wednesday evaluation.

The altered features are used to execute a downloader, which fetches a distant JSON configuration and an ELF payload from “63.250.56[.]54,” after which launches the ELF binary together with the configuration as enter instantly in reminiscence to keep away from leaving artifacts on disk. This method has been beforehand adopted by cryptojacking campaigns orchestrated by FritzFrog and Mimo.
The tip aim of the assault is to obtain two Linux ELF binaries which might be designed to mine cryptocurrency utilizing XMRig on Linux hosts.
“Each retrieved configurations use an XMRig appropriate schema that allows CPU mining, disables GPU backends, and directs the miner to Stratum over TLS endpoints on port 3333 hosted on the identical risk actor-controlled IP addresses,” Socket stated.
“Though we noticed cryptomining on this marketing campaign, the Python implant features as a normal objective loader that may fetch and execute arbitrary second stage code beneath the privileges of the Python course of.”

The Hacker News Tags:Deploys, Hosts, Impersonates, Linux, Malicious, Miner, Package, PyPI, SymPy, XMRig

Post navigation

Previous Post: SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
Next Post: Critical Vulnerability in Binary-Parser Library for Node.js Allows Malicious Code Injection

Related Posts

Coinbase Agents Bribed, Data of ~1% Users Leaked; M Extortion Attempt Fails Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News
North Korea-Linked UNC1069 Targets Crypto with AI Attacks North Korea-Linked UNC1069 Targets Crypto with AI Attacks The Hacker News
Germany Shuts Down eXch Over .9B Laundering, Seizes €34M in Crypto and 8TB of Data Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data The Hacker News
Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam The Hacker News
Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark