Malicious Soopsocks Package on PyPI Deploys Windows Backdoor, Hits 2,653 Downloads

A malicious Python package called Soopsocks, disguised as a SOCKS5 proxy tool, was uploaded to PyPI and downloaded 2,653 times before its removal on September 29, 2025. It deployed a Go-based backdoor on Windows systems, enabling persistence, data exfiltration to Discord, and proxy misuse. This incident highlights ongoing supply-chain vulnerabilities in open-source repositories, urging enhanced developer vigilance and AI-driven defenses.
Malicious Soopsocks Package on PyPI Deploys Windows Backdoor, Hits 2,653 Downloads
Written by Dorene Billings

In the ever-evolving world of cybersecurity threats, a seemingly innocuous Python package named Soopsocks has emerged as a stark reminder of the vulnerabilities lurking in open-source repositories. Masquerading as a legitimate SOCKS5 proxy tool, this malicious software was uploaded to the Python Package Index (PyPI) and managed to rack up 2,653 downloads before its swift removal on September 29, 2025. Security researchers from JFrog first flagged the package as suspicious, leading to its takedown, but not before it potentially compromised thousands of Windows systems worldwide.

The package’s deceptive nature allowed it to blend seamlessly into the vast ecosystem of PyPI, where developers routinely pull in third-party libraries to accelerate their work. Upon installation, Soopsocks executed a multi-stage attack, beginning with the deployment of a Go-based backdoor disguised as an executable file named _AUTORUN.EXE. This backdoor, according to a detailed analysis by The Hacker News, leveraged PowerShell scripts and Visual Basic Script (VBS) to establish persistence on infected machines, modifying Windows services and scheduled tasks to ensure long-term access.

The Hidden Mechanics of Persistence and Exfiltration

Further dissection reveals how Soopsocks escalated privileges to SYSTEM level, a move that granted attackers root-like control over compromised hosts. It altered firewall rules to evade detection, silently exfiltrating sensitive system data—including IP addresses, usernames, and hardware details—directly to a Discord webhook for command-and-control (C2) operations. Cybersecurity News, in its October 1, 2025, report, described this as an evolution into a “multi-stage persistent malware,” highlighting the package’s ability to transform ordinary Windows machines into stealthy proxies for further malicious activities.

This incident echoes a troubling pattern of supply-chain attacks targeting PyPI. Just months earlier, in March 2025, researchers uncovered 20 other malicious packages that stole cloud credentials from services like AWS and Alibaba, amassing over 14,100 downloads before removal, as noted in another The Hacker News investigation. The Soopsocks case builds on this, incorporating advanced evasion techniques such as DLL side-loading and backconnect capabilities reminiscent of the GhostSocks malware family, per insights from SecurityOnline.info.

Broader Implications for Open-Source Security

Industry experts warn that such threats exploit the trust inherent in open-source platforms. “The ongoing risks in ecosystems like PyPI underscore the need for vigilant dependency management,” said a spokesperson from JFrog Security in a statement shared on X, formerly Twitter, where posts from users like The Hacker News amplified the alert on October 2, 2025, reaching thousands of views. This package’s success in gaining traction—despite its short lifespan—points to gaps in automated scanning and the challenges of real-time threat detection in repositories hosting millions of packages.

For developers and organizations, the fallout could be severe, potentially leading to data breaches or pivots into larger network intrusions. Security Boulevard’s April 2025 analysis of a similar PyPI attack emphasized how these incidents signal a “new era in cloud risk,” with attackers increasingly focusing on stealth and persistence. In response, PyPI administrators have ramped up monitoring, but insiders argue that individual vigilance—such as verifying package metadata and using tools like pip-audit—is crucial.

Lessons from Past Attacks and Future Defenses

Historical precedents abound: Back in 2023, Unit 42 from Palo Alto Networks detailed six malicious PyPI packages mimicking credential-stealing tactics from earlier W4SP campaigns. More recently, August 2025 saw packages like termncolor exploiting DLL side-loading for C2 communication, downloaded 884 times, according to yet another The Hacker News report. Soopsocks refines these methods, integrating Discord as a low-cost C2 channel, which complicates attribution and takedown efforts.

To combat this, cybersecurity firms are advocating for enhanced AI-driven anomaly detection in package registries. Posts on X from figures like Leonid Bezvershenko in late 2024 highlighted similar long-undetected packages mimicking AI tools, underscoring the need for proactive measures. As one industry analyst put it, the Soopsocks breach isn’t just a one-off; it’s a call to action for bolstering supply-chain defenses before more sophisticated variants emerge.

Navigating the Road Ahead in Cyber Resilience

The economic ramifications extend beyond immediate victims. Compromised systems could facilitate ransomware or espionage, costing businesses millions in recovery and lost productivity. Drawing from CyberPress.org’s coverage on October 1, 2025, which exposed Soopsocks’ proxy masquerade, experts recommend isolating development environments and employing virtual environments to mitigate risks.

Ultimately, while PyPI’s quick response limited the damage—removing the package within days of JFrog’s report—the incident exposes systemic frailties. As threats grow more insidious, fostering a culture of skepticism toward unvetted code will be key. With ongoing phishing campaigns targeting PyPI maintainers, as reported by Cyber Security News just a week prior, the battle for secure software supply chains is far from over, demanding collaboration between developers, platforms, and security researchers to stay one step ahead.

Subscribe for Updates

WebProBusiness Newsletter

News & updates for website marketing and advertising professionals.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us