Start now →

Busted in 20 Minutes: How Uptycs XDR Unmasked a 6-Package Crypto Stealer Campaign on PyPI

By Nijin K · Published May 8, 2026 · 1 min read · Source: Cryptocurrency Tag
EthereumDeFiAltcoins
Busted in 20 Minutes: How Uptycs XDR Unmasked a 6-Package Crypto Stealer Campaign on PyPI

Member-only story

Busted in 20 Minutes: How Uptycs XDR Unmasked a 6-Package Crypto Stealer Campaign on PyPI

Nijin KNijin K3 min read·Just now

--

In a sophisticated supply-chain attack, a single threat actor — operating under the alias aaccb777 (also known as smileyyuu)—successfully uploaded a suite of six malicious packages to the Python Package Index (PyPI). While these packages masqueraded as helpful SDKs for Solana, Ethereum, and Tron, their true purpose was to harvest private keys and drain wallets.

Press enter or click to view image in full size

By leveraging the Uptycs XDR platform, I was able to “bust” the entire campaign by identifying common behavioral signatures across all six projects. Here is a deep dive into how the attack functioned and how modern XDR can stop it.

The "Dirty Half-Dozen": The Malicious Suite

The attacker released six packages simultaneously to cast as wide a net as possible across the developer community:

  1. solana-py-sdk: Targets Solana developers.
  2. eth-wallet-kit: Targets Ethereum developers.
  3. tron-energy-sdk: Targets Tron ecosystem developers.
  4. web3-tool-sdk: A generic target for Web3 developers.
  5. crypto-bot-utils: Targets developers building automated trading bots.
  6. wallet-scanner-pro: Deceptively marketed as a security utility.
This article was originally published on Cryptocurrency Tag and is republished here under RSS syndication for informational purposes. All rights and intellectual property remain with the original author. If you are the author and wish to have this article removed, please contact us at [email protected].

NexaPay — Accept Card Payments, Receive Crypto

No KYC · Instant Settlement · Visa, Mastercard, Apple Pay, Google Pay

Get Started →