Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Home/Threats/Malicious Pyronut Package Backdoors Telegram Bots With Remote
Threats

Malicious Pyronut Package Backdoors Telegram Bots With Remote

On the Python Package Index (PyPI), a malicious Python package named pyronut has been identified. This package specifically targets developers building Telegram bots, impersonating the popular...

David kimber
David kimber
March 19, 2026 3 Min Read
0 0

On the Python Package Index (PyPI), a malicious Python package named pyronut has been identified. This package specifically targets developers building Telegram bots, impersonating the popular pyrogram framework.

Rather than relying on typosquatting — where a name resembles a legitimate one — the threat actor copied pyrogram’s entire project description word-for-word, creating what researchers describe as a malicious fork, a trojanized copy designed to reach victims through social engineering.​

The pyrogram framework attracts roughly 370,000 downloads every month, making it a high-value target for this type of impersonation. 

Pyronut copied pyrogram’s project page without adding any new features, and its listed GitHub repository URL pointed to a page that did not exist.

This suggests the package was distributed through Telegram communities and developer forums rather than discovered by accident. Three versions were published — 2.0.184, 2.0.185, and 2.0.186 — all malicious.​

Endor Labs researchers identified all three versions on March 18, 2026 — the same day they appeared on PyPI — and had them quarantined within hours. This swift response kept the attack window short and reduced the number of developers at risk.

Still, any developer whose bot ran the package during that brief window was fully exposed to compromise.​

What made pyronut especially difficult to detect was its runtime activation strategy. Unlike most malicious packages that execute harmful code through setup.py hooks at installation time, pyronut stayed completely dormant until a developer actually ran their bot.

It embedded a hidden backdoor module at pyrogram/helpers/secret.py, which loaded silently every time the Telegram client started, bypassing standard install-time security checks entirely.​

The consequences of a successful infection were severe. Once the backdoor activated, the attacker gained dual Remote Code Execution (RCE) capabilities — the power to run arbitrary Python code and arbitrary shell commands on the victim’s machine.

This opened the door to credential theft, data exfiltration, lateral movement across systems, and complete takeover of the victim’s active Telegram session.

Package Version Publication Date Status
pyronut 2.0.184 2026-03-18 Quarantined Malicious-Pyronut-Package-Backdoors-Telegram-Bots-With-Remote-Code-Execution.pdf​
pyronut 2.0.185 2026-03-18 Quarantined Malicious-Pyronut-Package-Backdoors-Telegram-Bots-With-Remote-Code-Execution.pdf​
pyronut 2.0.186 2026-03-18 Quarantined Malicious-Pyronut-Package-Backdoors-Telegram-Bots-With-Remote-Code-Execution.pdf​

Runtime Backdoor: How the Attack Operated

The backdoor activated the moment a developer called the Client.start() method, a core step in how any pyrogram-based Telegram bot initializes.

The threat actor had modified this method inside pyrogram/methods/utilities/start.py to silently import and run the hidden secret.py module each time a client started.

Critically, the entire call was wrapped in a bare try/except: pass block, so if the backdoor encountered any error, it failed silently and the bot continued running as normal.​

Once running, the backdoor registered two hidden message handlers on the victim’s Telegram client, tied to two hardcoded attacker account IDs.

The first handler, triggered by the /e command, used the meval library to run arbitrary Python code inside the live session, granting full access to messages, contacts, and Telegram API functions.

The second handler, /shell, passed commands directly to /bin/bash via subprocess, giving the attacker unrestricted system access. The backdoor also skipped installation on the attacker’s own accounts — a clear mark of deliberate malicious intent.​

Command outputs were sent back to the attacker through Telegram itself, with results returned in the same chat where commands were issued.

This meant the operation left no unusual external network connections, no suspicious DNS queries, and no C2 domains for monitoring tools to flag — making the backdoor extremely hard to detect through conventional network analysis.​

Developers who may have installed pyronut should immediately uninstall the package and rebuild affected virtual environments from a clean, verified state.

All environment variables, API keys, SSH keys, and database passwords accessible to the compromised process should be treated as exposed and rotated right away. Active Telegram sessions must be terminated and all Bot API tokens revoked immediately.

Dependency files such as requirements.txt, Pipfile, and pyproject.toml should be reviewed regularly for unexpected packages, and lockfiles with cryptographic hash pinning should be used to prevent silent substitutions.

Running applications under the principle of least privilege and integrating Software Composition Analysis tools into CI/CD pipelines will significantly reduce exposure to similar supply chain attacks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Horabot Banking Trojan Attacks Mexico with Phishing & Email Worm

Next Post

Critical Claude Vulnerabilities Exfiltrate Data & Redirect Users

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us