Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT). The packages, named spellcheckerpy and spellcheckpy, are no longer available on PyPI, but not before they were collectively downloaded a little over 1,000 times. "Hidden inside the Basque
AI Analysis
Technical Summary
Researchers discovered two malicious Python packages on the PyPI repository—spellcheckerpy and spellcheckpy—that impersonated legitimate spellchecking tools but contained a hidden remote access trojan (RAT). These packages were downloaded over 1,000 times before being removed. The malicious payload was embedded inside a compressed Basque language dictionary file (resources/eu.json.gz) as a base64-encoded string under the key "spellchecker." Unlike typical malware hidden in __init__.py scripts, this payload was concealed in a data file, making detection more difficult. Initial versions of the packages only decoded the payload without execution, but version 1.2.0 introduced an obfuscated trigger that executed the RAT upon importing the SpellChecker module. The RAT downloader contacts an external domain (updatenet[.]work) hosted by RouterHosting LLC, a provider with a history of supporting nation-state threat actors. The RAT can fingerprint the infected system, parse commands, and execute them remotely, enabling full control over compromised hosts. This campaign appears linked to previous malicious Python packages and coincides with similar supply chain attacks in npm packages targeting industrial and energy sectors in Europe and beyond. The threat also underscores emerging risks from AI-generated or squatted package names that may be inadvertently trusted and installed by developers and automated agents. No known exploits in the wild have been reported yet, but the stealthy nature and supply chain vector make this a significant threat to Python users.
Potential Impact
European organizations relying on Python packages from PyPI, particularly those using spellchecking or natural language processing libraries, face risks of system compromise, data exfiltration, and remote control by attackers. The RAT enables attackers to execute arbitrary commands, potentially leading to credential theft, lateral movement, espionage, or disruption of critical services. Supply chain attacks like this can bypass traditional perimeter defenses because the malicious code is delivered through trusted software repositories. Industries with high Python usage such as finance, technology, research, and critical infrastructure in Europe could be targeted. The association of the hosting provider with nation-state actors raises concerns about espionage or sabotage. Additionally, the campaign's timing alongside attacks targeting industrial and energy companies in France, Germany, and Spain suggests a strategic focus on European critical sectors. The stealthy embedding of payloads in data files complicates detection by standard security tools, increasing the risk of prolonged undetected compromise.
Mitigation Recommendations
1. Implement strict vetting and approval processes for third-party Python packages before deployment, including verifying package authorship and checking for known malicious indicators. 2. Use tools like PyPI package reputation services and dependency scanning to detect suspicious or squatted package names. 3. Monitor and restrict network egress traffic from development and production environments to block connections to suspicious domains such as updatenet[.]work. 4. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions capable of detecting unusual Python process behaviors, such as unexpected network connections or code execution from data files. 5. Educate developers and DevOps teams about supply chain risks and the dangers of blindly trusting open-source packages, especially those with low download counts or recent publication dates. 6. Maintain up-to-date inventories of all installed Python packages and regularly audit them for anomalies. 7. Consider using package signing and integrity verification mechanisms where available. 8. Leverage AI and machine learning-based tools to detect anomalous package behaviors and dependencies introduced by automated agents. 9. Collaborate with cybersecurity communities and threat intelligence providers to stay informed about emerging malicious packages and supply chain threats.
Affected Countries
France, Germany, Spain, United Kingdom, Netherlands, Italy
Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Description
Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that masquerade as spellcheckers but contain functionality to deliver a remote access trojan (RAT). The packages, named spellcheckerpy and spellcheckpy, are no longer available on PyPI, but not before they were collectively downloaded a little over 1,000 times. "Hidden inside the Basque
AI-Powered Analysis
Technical Analysis
Researchers discovered two malicious Python packages on the PyPI repository—spellcheckerpy and spellcheckpy—that impersonated legitimate spellchecking tools but contained a hidden remote access trojan (RAT). These packages were downloaded over 1,000 times before being removed. The malicious payload was embedded inside a compressed Basque language dictionary file (resources/eu.json.gz) as a base64-encoded string under the key "spellchecker." Unlike typical malware hidden in __init__.py scripts, this payload was concealed in a data file, making detection more difficult. Initial versions of the packages only decoded the payload without execution, but version 1.2.0 introduced an obfuscated trigger that executed the RAT upon importing the SpellChecker module. The RAT downloader contacts an external domain (updatenet[.]work) hosted by RouterHosting LLC, a provider with a history of supporting nation-state threat actors. The RAT can fingerprint the infected system, parse commands, and execute them remotely, enabling full control over compromised hosts. This campaign appears linked to previous malicious Python packages and coincides with similar supply chain attacks in npm packages targeting industrial and energy sectors in Europe and beyond. The threat also underscores emerging risks from AI-generated or squatted package names that may be inadvertently trusted and installed by developers and automated agents. No known exploits in the wild have been reported yet, but the stealthy nature and supply chain vector make this a significant threat to Python users.
Potential Impact
European organizations relying on Python packages from PyPI, particularly those using spellchecking or natural language processing libraries, face risks of system compromise, data exfiltration, and remote control by attackers. The RAT enables attackers to execute arbitrary commands, potentially leading to credential theft, lateral movement, espionage, or disruption of critical services. Supply chain attacks like this can bypass traditional perimeter defenses because the malicious code is delivered through trusted software repositories. Industries with high Python usage such as finance, technology, research, and critical infrastructure in Europe could be targeted. The association of the hosting provider with nation-state actors raises concerns about espionage or sabotage. Additionally, the campaign's timing alongside attacks targeting industrial and energy companies in France, Germany, and Spain suggests a strategic focus on European critical sectors. The stealthy embedding of payloads in data files complicates detection by standard security tools, increasing the risk of prolonged undetected compromise.
Mitigation Recommendations
1. Implement strict vetting and approval processes for third-party Python packages before deployment, including verifying package authorship and checking for known malicious indicators. 2. Use tools like PyPI package reputation services and dependency scanning to detect suspicious or squatted package names. 3. Monitor and restrict network egress traffic from development and production environments to block connections to suspicious domains such as updatenet[.]work. 4. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions capable of detecting unusual Python process behaviors, such as unexpected network connections or code execution from data files. 5. Educate developers and DevOps teams about supply chain risks and the dangers of blindly trusting open-source packages, especially those with low download counts or recent publication dates. 6. Maintain up-to-date inventories of all installed Python packages and regularly audit them for anomalies. 7. Consider using package signing and integrity verification mechanisms where available. 8. Leverage AI and machine learning-based tools to detect anomalous package behaviors and dependencies introduced by automated agents. 9. Collaborate with cybersecurity communities and threat intelligence providers to stay informed about emerging malicious packages and supply chain threats.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/fake-python-spellchecker-packages-on.html","fetched":true,"fetchedAt":"2026-01-28T20:27:04.337Z","wordCount":1203}
Threat ID: 697a711c4623b1157ced2a1e
Added to database: 1/28/2026, 8:27:08 PM
Last enriched: 1/28/2026, 8:29:29 PM
Last updated: 1/29/2026, 11:07:53 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Dissecting UAT-8099: New persistence mechanisms and regional focus
MediumExposed BYOB C2 Infrastructure Reveals a Multi-Stage Malware Deployment
MediumN8n Vulnerabilities Could Lead to Remote Code Execution
CriticalSolarWinds Patches Critical Web Help Desk Vulnerabilities
CriticalThreatFox IOCs for 2026-01-28
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.