Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

0
Medium
Published: Wed Jan 28 2026 (01/28/2026, 09:30:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT). The packages, named spellcheckerpy and spellcheckpy, are no longer available on PyPI, but not before they were collectively downloaded a little over 1,000 times. "Hidden inside the Basque

AI-Powered Analysis

AILast updated: 01/28/2026, 20:29:29 UTC

Technical Analysis

Researchers discovered two malicious Python packages on the PyPI repository—spellcheckerpy and spellcheckpy—that impersonated legitimate spellchecking tools but contained a hidden remote access trojan (RAT). These packages were downloaded over 1,000 times before being removed. The malicious payload was embedded inside a compressed Basque language dictionary file (resources/eu.json.gz) as a base64-encoded string under the key "spellchecker." Unlike typical malware hidden in __init__.py scripts, this payload was concealed in a data file, making detection more difficult. Initial versions of the packages only decoded the payload without execution, but version 1.2.0 introduced an obfuscated trigger that executed the RAT upon importing the SpellChecker module. The RAT downloader contacts an external domain (updatenet[.]work) hosted by RouterHosting LLC, a provider with a history of supporting nation-state threat actors. The RAT can fingerprint the infected system, parse commands, and execute them remotely, enabling full control over compromised hosts. This campaign appears linked to previous malicious Python packages and coincides with similar supply chain attacks in npm packages targeting industrial and energy sectors in Europe and beyond. The threat also underscores emerging risks from AI-generated or squatted package names that may be inadvertently trusted and installed by developers and automated agents. No known exploits in the wild have been reported yet, but the stealthy nature and supply chain vector make this a significant threat to Python users.

Potential Impact

European organizations relying on Python packages from PyPI, particularly those using spellchecking or natural language processing libraries, face risks of system compromise, data exfiltration, and remote control by attackers. The RAT enables attackers to execute arbitrary commands, potentially leading to credential theft, lateral movement, espionage, or disruption of critical services. Supply chain attacks like this can bypass traditional perimeter defenses because the malicious code is delivered through trusted software repositories. Industries with high Python usage such as finance, technology, research, and critical infrastructure in Europe could be targeted. The association of the hosting provider with nation-state actors raises concerns about espionage or sabotage. Additionally, the campaign's timing alongside attacks targeting industrial and energy companies in France, Germany, and Spain suggests a strategic focus on European critical sectors. The stealthy embedding of payloads in data files complicates detection by standard security tools, increasing the risk of prolonged undetected compromise.

Mitigation Recommendations

1. Implement strict vetting and approval processes for third-party Python packages before deployment, including verifying package authorship and checking for known malicious indicators. 2. Use tools like PyPI package reputation services and dependency scanning to detect suspicious or squatted package names. 3. Monitor and restrict network egress traffic from development and production environments to block connections to suspicious domains such as updatenet[.]work. 4. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions capable of detecting unusual Python process behaviors, such as unexpected network connections or code execution from data files. 5. Educate developers and DevOps teams about supply chain risks and the dangers of blindly trusting open-source packages, especially those with low download counts or recent publication dates. 6. Maintain up-to-date inventories of all installed Python packages and regularly audit them for anomalies. 7. Consider using package signing and integrity verification mechanisms where available. 8. Leverage AI and machine learning-based tools to detect anomalous package behaviors and dependencies introduced by automated agents. 9. Collaborate with cybersecurity communities and threat intelligence providers to stay informed about emerging malicious packages and supply chain threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/fake-python-spellchecker-packages-on.html","fetched":true,"fetchedAt":"2026-01-28T20:27:04.337Z","wordCount":1203}

Threat ID: 697a711c4623b1157ced2a1e

Added to database: 1/28/2026, 8:27:08 PM

Last enriched: 1/28/2026, 8:29:29 PM

Last updated: 1/29/2026, 11:07:53 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats