PyPI ‘sympy-dev’ package deploys XMRig miner via backdoor…

  • sympy-dev on PyPI impersonated the SymPy library and has been downloaded over 1,100 times since its January 17, 2026 release.
  • The package modifies library routines to fetch a remote JSON, download an ELF payload, and execute it in memory to run an XMRig cryptocurrency miner on Linux hosts.
  • The malicious loader triggers only when specific polynomial functions are called and can execute arbitrary second-stage code under the Python process privileges.

A malicious Python package named sympy-dev on PyPI, published January 17, 2026, imitates the description of the legitimate SymPy project to lure users. The package has recorded more than 1,100 downloads and remains available at its PyPI page (https://pypi.org/project/sympy-dev/).

- Advertisement -

Analysis by Malware“>Socket shows the backdoored code alters certain polynomial routines to act as a downloader for a Linux ELF payload and configuration. The modified functions fetch a remote JSON configuration, download an ELF binary from the actor-controlled host 63.250.56[.]54, and execute the binary directly from memory using Linux memfd_create and /proc/self/fd to limit on-disk traces.

Security researcher Kirill Boychenko described the behavior in a Wednesday analysis: “When invoked, the backdoored functions retrieve a remote JSON configuration, download a threat actor-controlled ELF payload, then execute it from an anonymous memory-backed file descriptor using Linux memfd_create and /proc/self/fd, which reduces on-disk artifacts.”

The downloaded components include two ELF binaries that implement an XMRig-compatible mining setup. Socket noted that the configurations “use an XMRig compatible schema that enables CPU mining, disables GPU backends, and directs the miner to Stratum over TLS endpoints on port 3333 hosted on the same threat actor-controlled IP addresses.” “Although we observed cryptomining in this campaign, the Python implant functions as a general purpose loader that can fetch and execute arbitrary second stage code under the privileges of the Python process.”

The memory-only execution technique mirrors methods previously used by campaigns such as FritzFrog and Mimo. The package’s downloader behavior means affected Python processes may run additional payloads without writing them to disk.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Radix Community Defines Voting Asset Eligibility

The Radix community has formally defined which assets constitute valid voting power for future...

Amazon Stock Plunges on $200B AI Spending Plan

Amazon (AMZN) stock fell over 8% on Friday, extending a 14% weekly decline after...

Amazon, Meta Stock Outlook Amid Heavy AI Spending Plans

US stock markets show mixed signals as traditional tech giants project strength while precious...

China Warns RWA Tokenization Could Be Illegal

Chinese regulators have intensified their crypto crackdown, warning that tokenizing real-world assets could constitute...

Strategy loses $7B after missing Bitcoin profit

Strategy reported a catastrophic fourth-quarter diluted loss of $42.93 per share, a year-over-year increase...
- Advertisement -

Must Read

Are Cryptocurrency Securities?

TL;DR - Cryptocurrencies are not typically considered securities, as they are decentralized digital assets that operate independently of any central authority or government. However,...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!