Malicious Package Affecting feur package, versions [0,]
Threat Intelligence
Exploit Maturity
Mature
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-FEUR-5798568
- published 21 Jul 2023
- disclosed 21 Jul 2023
- credit Sonatype
How to fix?
Avoid using all malicious instances of the feur
package.
Overview
feur is a malicious package. Once installed, the package executes a 'setup.py' file containing two base64-encoded strings. The first one establishes a reverse shell connection to an Ngrok tunnel. The second encodes a Windows Executable (EXE) file, which is a Remote Access Trojan (RAT) that runs immediately after the package installation.
References
CVSS Scores
version 3.1