Skip to Content

Malicious PyPI Module Pretends to be SentinelOne Client

Updated on 2022-12-19

A malicious PyPI package, SentinelOne, was used in a campaign dubbed SentinelSneak to harvest sensitive information from developers. The package was uploaded along with five other malicious packages with similar names and similar functionalities. Read more: Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malware

Overview: Malicious PyPI Module Pretends to be SentinelOne Client

Researchers from ReversingLabs have detected a malicious package on the Python Package Index (PyPI). The package pretends to be a SentinelOne software development kit (SDK) but is actually a Trojan horse program that abets data theft. According to ReversingLabs, “the malicious functionality in the library does not execute upon installation, but waits to be called on programmatically before activating — a possible effort to avoid detection.” The malicious package was uploaded to PyPI on December 11 and has since been removed.


  • Be aware of what you import. There is no vetting happening to add a package to PyPI. If you plan on using a vendor’s API, double check if they offer or recommend a specific package. But also monitor sites like PyPI for your trademarks just like you attempt to watch out for phishing sites.
  • While we are all raising the bar on packages we’re downloading, expect our adversaries to raise the lie bar as well. Stay the course, make sure that you’re only using the qualified versions of packages from the correct repository, and make sure you have notifications to act on if things don’t jive.
  • Not all instances of supply chain contamination will be, or are even intended to be, exploited, but all will weaken the infrastructure and reduce the cost of attack against selected targets.


    Ads Blocker Image Powered by Code Help Pro

    It looks like you are using an adblocker.

    Ads keep our content free. Please consider supporting us by allowing ads on