-= Per source details. Do not edit below this line.=-
This campaign is built from two parts:
Apparently, the campaign started at least 2 years ago with the snapshot-photo package containing the same functionality as the newer time-check-server (see https://github.com/pypi-data/pypi-mirror-238/blob/code/packages/snapshot-photo/snapshot_photo-0.0.3-py3-none-any.whl/snapshot_photo/date_format.py).
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-02-alicloud-client
Reasons (based on the campaign):
clones-real-package
action-hidden-in-lib-usage
The malicious code is intentionally included in a dependency of the package
exfiltration-cloud-tokens
1.0.01.0.11.0.21.0.3Exploitability
AV:NAC:LPR:NUI:NScope
S:CImpact
C:HI:HA:H10.0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H