Embedded Malicious Code Affecting durabletask package, versions [1.4.1][1.4.2][1.4.3]


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-DURABLETASK-16761538
  • published20 May 2026
  • disclosed18 May 2026
  • creditUnknown

Introduced: 18 May 2026

New Malicious CVE NOT AVAILABLE CWE-506  (opens in a new tab)

How to fix?

Avoid using all malicious instances of the durabletask package.

Overview

durabletask is an A Durable Task Client SDK for Python

Affected versions of this package are vulnerable to Embedded Malicious Code that conceals a malicious payload. A malicious actor linked to the @antv appears to have compromised the GitHub account associated with the package and dumped repository secrets to extract a PyPI token; This allowed the attacker to publish tampered versions of the Microsoft durabletask package to PyPI.

Payload Behavior

According to security reports, the payload is designed to establish communications with external C2 servers and steal credentials from AWS, Azure, GCP, Kubernetes, Vault, and the filesystem. It actively attempts to brute-force password managers like Bitwarden and 1Password, scrapes shell history, and acts as a worm to propagate laterally across AWS SSM and Kubernetes. The malware will persist and leave an infection marker on the system by creating a file at ~/.cache/.sys-update-check or ~/.cache/.sys-update-check-k8s if on Linux. If you find any files in these locations, you have been compromised and should no longer trust the system to be safe.

Notes:

  1. This issue is particularly relevant to Linux systems where the payload targets various cloud and environment credentials.
  2. The malicious packages (versions 1.4.1, 1.4.2, and 1.4.3) have been quarantined and removed by PyPI.
  3. If exposed, all associated cloud credentials, service accounts, and password manager vaults should be rotated immediately.

CVSS Base Scores

version 4.0
version 3.1