This looks to be gathering information about the user's IP address and computer info (via os.uname) and sending that to a remote server along with the name of the company/companies being targeted by the squat.
I can only assume this is supposed to be a supply chain attack, although the packages don't appear to be attempting to gain control over the user's PC. Some of the projects have descriptions like "Proof by kotko", as if they are trying to prove that a supply chain attack is possible.
None of the projects have wheels, so will be built from the sdist and trigger the code to report back to the remote server.
For at least some of the projects, the homepage URL points to a non-existent github repository.
The following table lists the projects, along with the companies listed within the packages (which I assume are targets).
PyPI user performing the mass project name squatting
https://pypi.org/user/kot0x1
Additional information
All of the user's packages have the same format: after installation, or on import, the following code runs:
This looks to be gathering information about the user's IP address and computer info (via
os.uname
) and sending that to a remote server along with the name of the company/companies being targeted by the squat.I can only assume this is supposed to be a supply chain attack, although the packages don't appear to be attempting to gain control over the user's PC. Some of the projects have descriptions like "Proof by kotko", as if they are trying to prove that a supply chain attack is possible.
None of the projects have wheels, so will be built from the sdist and trigger the code to report back to the remote server.
For at least some of the projects, the homepage URL points to a non-existent github repository.
The following table lists the projects, along with the companies listed within the packages (which I assume are targets).
Code of Conduct