Categories: Cyber Security News

PyPI Package Pretends to Be a SOCKS5 Proxy Tool and Targets Windows Systems

Frog’s security research team recently exposed a PyPI package, SoopSocks, that masqueraded as a straightforward SOCKS5 proxy installer while covertly embedding backdoor functionality on Windows systems.

Marketed as a Python module enabling SOCKS5 service creation and network reporting via Discord webhooks, SoopSocks was withdrawn from PyPI on September 29 following the team’s disclosure of its suspicious behavior.

Early releases (v0.1.0–v0.1.2) implemented a basic SOCKS5 server. Subsequent updates (v0.2.0–v0.2.4) incorporated a Go-compiled executable named autorun.exe and added support for Windows services.

Versions 0.2.5 and 0.2.6 introduced a VBScript-based deployment path, and the latest v0.2.7 consolidated distribution into an EXE-only package. Across all versions, installation routines execute silently, elevate privileges, and ensure persistence.

The primary installer, autorun.exe, unpacks embedded PowerShell scripts, configures inbound TCP/UDP firewall rules on port 1080, and installs itself as a Windows service called SoopSocksSvc under C:Program Filessocks5svcsocks5svc.exe.

It launches PowerShell in hidden mode with execution policy bypassed, profile loading disabled, and error output suppressed, techniques designed to avoid detection. The service runs with SYSTEM privileges and uses Kardianos’s Go service library to mirror the Python module’s proxy capabilities.

Advanced Persistence and Reconnaissance Mechanisms

Legacy VBScript installers create COM objects for WScript.Shell and Scripting.FileSystemObjectDownload a portable Python distribution from a hardcoded URL and generate a PowerShell bootstrap script. This script elevates privileges via UAC bypass, installs SoopSocks and pywin32 via pip, and executes SoopSocks in “auto” mode.

If service creation fails, it falls back to creating a scheduled task named SoopSocksAuto, which triggers on system startup and user logon.

Once active, SoopSocks listens on port 1080 without authentication, forwarding arbitrary TCP and UDP traffic.

Simultaneously, it performs network reconnaissance by querying multiple external IP services (e.g., api.ipify.orgifconfig.me/ip) and Google’s STUN server, packaging results into JSON embeds and sending them every 30 seconds to a hardcoded Discord webhook.

Additional host fingerprinting gathers Internet Explorer security settings and Windows installation dates.

Persistence is solidified through automatic service registration, scheduled tasks, and modifications to firewall rules.

VBScript screenshot out of version 0.2.5

Indicators of compromise include the _autorun.exe binary, _autorun.vbs script, the SoopSocksSvc service, SoopSocksAuto task, firewall rules for TCP/UDP port 1080, and PythonPortable folders under C:PythonPortable.

SoopSocks’s blend of persistent backdoor access, unrestricted proxying, and continuous data exfiltration via Discord renders it a high risk to corporate networks.

Immediate remediation should isolate infected hosts, block connections to the Discord webhook and installer domains, remove the SoopSocks service and tasks, and revoke the firewall rules.

Security teams are advised to deploy YARA signatures targeting the SoopSocks binaries, VBScript installer patterns, and the Discord webhook URL to detect and neutralize this threat.

Indicators of Compromise (IOCs):

Network Indicators:

  • Discord Webhook: hxxps[:]//discord[.]com/api/webhooks/1418298773330985154/_I7EzXpGMundYt8jCvlDdzi9INsBkBq7NSDM74iV0Y_flSzQZ5LxYP0lZtXFzHCkRtKR
  • Download Server: install.soop.space:6969

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post PyPI Package Pretends to Be a SOCKS5 Proxy Tool and Targets Windows Systems appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Don’t Expect Crimson Desert Xbox Series X or S Gameplay Footage Before Launch

Crimson Desert developer and publisher Pearl Abyss won’t show gameplay footage of the Xbox Series…

26 minutes ago

Pragmata: Here’s What Comes in Each Edition

Pragmata is coming to PS5, Switch 2, Xbox, and PC on April 17. This is…

28 minutes ago

The Lenovo Legion Pro 5 Gaming Laptop with OLED Display and RTX 5070 GPU Drops Below $1,300

Lenovo's annual Spring Sale is well underway with this great deal on an affordable yet…

28 minutes ago

Kiln, the Next Game From Psychonauts Studio Double Fine, Has an April Launch Date and Steam Open Beta

Double Fine's Kiln will launch in April across PC and consoles, following a series of…

28 minutes ago

The Seven Deadly Sins: Origin Review So Far

If you don’t know The Seven Deadly Sins series – which, for context, includes over…

28 minutes ago

ESA Foundation Raises $1.15 Million With Nite to Unite

The latest Nite to Unite fundraiser raised $1.15 million to support undergraduate scholarships and grants…

1 hour ago

This website uses cookies.