PyPI ‘sympy-dev’ package deploys XMRig miner via backdoor…

  • sympy-dev on PyPI impersonated the SymPy library and has been downloaded over 1,100 times since its January 17, 2026 release.
  • The package modifies library routines to fetch a remote JSON, download an ELF payload, and execute it in memory to run an XMRig cryptocurrency miner on Linux hosts.
  • The malicious loader triggers only when specific polynomial functions are called and can execute arbitrary second-stage code under the Python process privileges.

A malicious Python package named sympy-dev on PyPI, published January 17, 2026, imitates the description of the legitimate SymPy project to lure users. The package has recorded more than 1,100 downloads and remains available at its PyPI page (https://pypi.org/project/sympy-dev/).

- Advertisement -

Analysis by Malware“>Socket shows the backdoored code alters certain polynomial routines to act as a downloader for a Linux ELF payload and configuration. The modified functions fetch a remote JSON configuration, download an ELF binary from the actor-controlled host 63.250.56[.]54, and execute the binary directly from memory using Linux memfd_create and /proc/self/fd to limit on-disk traces.

Security researcher Kirill Boychenko described the behavior in a Wednesday analysis: “When invoked, the backdoored functions retrieve a remote JSON configuration, download a threat actor-controlled ELF payload, then execute it from an anonymous memory-backed file descriptor using Linux memfd_create and /proc/self/fd, which reduces on-disk artifacts.”

The downloaded components include two ELF binaries that implement an XMRig-compatible mining setup. Socket noted that the configurations “use an XMRig compatible schema that enables CPU mining, disables GPU backends, and directs the miner to Stratum over TLS endpoints on port 3333 hosted on the same threat actor-controlled IP addresses.” “Although we observed cryptomining in this campaign, the Python implant functions as a general purpose loader that can fetch and execute arbitrary second stage code under the privileges of the Python process.”

The memory-only execution technique mirrors methods previously used by campaigns such as FritzFrog and Mimo. The package’s downloader behavior means affected Python processes may run additional payloads without writing them to disk.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

GLM-5 Launch Sparks Surge in Chinese AI Stocks

Hong Kong-listed Zhipu AI launched its GLM-5 AI model on February 11, 2026.The launch...

Crypto Fear and Greed Index Plunges to March 2020 Low

The Crypto Fear and Greed Index plunged to a reading of 5, its lowest...

Russia Blocks WhatsApp, Pushing Users to State App

Russian authorities moved to fully block Meta's WhatsApp on February 12, 2026, to funnel...

META to Build $10B Indiana Data Center for US AI Push

Meta is investing $10 billion in a new U.S. data center in Indiana to...

Strategy shifts Bitcoin buy plan to focus on preferred stock

Strategy is shifting its capital strategy to fund Bitcoin purchases from common stock sales...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!