<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://0.0.0.0:10001/rss/recent/ossf_malicious_packages/10</id>
  <title>Most recent entries from ossf_malicious_packages</title>
  <updated>2026-05-13T17:09:52.571895+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://0.0.0.0:10001" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent entries.</subtitle>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3635</id>
    <title>mal-2026-3635</title>
    <updated>2026-05-13T17:09:52.609323+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: google-open-source-security (a4e4f74e90479d472a307d311d48214827e21cf93ecf9b0b62ff2cb72adb2c9e)
This package is a malicious packages part of the Go BufferZoneCorp and RubyGems knot-theory clusters.
The packages in this cluster steal credentials, set up ssh access and tamper with build/workflow environmetn variables.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3635"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: google-open-source-security (a4e4f74e90479d472a307d311d48214827e21cf93ecf9b0b62ff2cb72adb2c9e)
This package is a malicious packages part of the Go BufferZoneCorp and RubyGems knot-theory clusters.
The packages in this cluster steal credentials, set up ssh access and tamper with build/workflow environmetn variables.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3636</id>
    <title>mal-2026-3636</title>
    <updated>2026-05-13T17:09:52.609314+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: google-open-source-security (a4e4f74e90479d472a307d311d48214827e21cf93ecf9b0b62ff2cb72adb2c9e)
This package is a malicious packages part of the Go BufferZoneCorp and RubyGems knot-theory clusters.
The packages in this cluster steal credentials, set up ssh access and tamper with build/workflow environmetn variables.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3636"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: google-open-source-security (a4e4f74e90479d472a307d311d48214827e21cf93ecf9b0b62ff2cb72adb2c9e)
This package is a malicious packages part of the Go BufferZoneCorp and RubyGems knot-theory clusters.
The packages in this cluster steal credentials, set up ssh access and tamper with build/workflow environmetn variables.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3637</id>
    <title>mal-2026-3637</title>
    <updated>2026-05-13T17:09:52.609305+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: google-open-source-security (0bd33abd6fda35e856f8346fda5e85913ce2cad6b4d6c315a2e7138b867760aa)
This package is malicious and was compromised as part of the Mini Shai-Hulud campaign by the TeamPCP threat actor.
The malicious payload steals credentials, and can propogate to NPM packages using credentials it finds.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3637"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: google-open-source-security (0bd33abd6fda35e856f8346fda5e85913ce2cad6b4d6c315a2e7138b867760aa)
This package is malicious and was compromised as part of the Mini Shai-Hulud campaign by the TeamPCP threat actor.
The malicious payload steals credentials, and can propogate to NPM packages using credentials it finds.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3638</id>
    <title>mal-2026-3638</title>
    <updated>2026-05-13T17:09:52.609297+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (195e6ac284c1a3e97b7683250a5514ed89d903819d2a3c97987782d4725e0e9f)
Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2025-11-spellcheckers


Reasons (based on the campaign):


 - obfuscation


 - Downloads and executes a remote malicious script.


 - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3638"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (195e6ac284c1a3e97b7683250a5514ed89d903819d2a3c97987782d4725e0e9f)
Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2025-11-spellcheckers


Reasons (based on the campaign):


 - obfuscation


 - Downloads and executes a remote malicious script.


 - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3654</id>
    <title>mal-2026-3654</title>
    <updated>2026-05-13T17:09:52.609288+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (76482d9b1a887d0692b8dd6aab8071a8d96388a065c1e512999107e4c4e9cd54)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3654"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (76482d9b1a887d0692b8dd6aab8071a8d96388a065c1e512999107e4c4e9cd54)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3655</id>
    <title>mal-2026-3655</title>
    <updated>2026-05-13T17:09:52.609276+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (280757b24c4ec5428a205e302200508a0438aa8f51e0a6ad95dbd3728f6a4db1)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3655"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (280757b24c4ec5428a205e302200508a0438aa8f51e0a6ad95dbd3728f6a4db1)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3657</id>
    <title>mal-2026-3657</title>
    <updated>2026-05-13T17:09:52.609266+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (fef1582aa7fb15599bd48e6f077be4d1a577d3916cf2c2650893f0406ede8ea3)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3657"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (fef1582aa7fb15599bd48e6f077be4d1a577d3916cf2c2650893f0406ede8ea3)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3656</id>
    <title>mal-2026-3656</title>
    <updated>2026-05-13T17:09:52.609253+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (44f072eff9ef90a204331ae1a03c5c4296929dbf88a05fff1a529e397548421a)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3656"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (44f072eff9ef90a204331ae1a03c5c4296929dbf88a05fff1a529e397548421a)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3658</id>
    <title>mal-2026-3658</title>
    <updated>2026-05-13T17:09:52.609229+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (04d9f5ba202651d252a375411cf609db6f9a7ae83f164f6f2e66559a6dff5b92)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3658"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (04d9f5ba202651d252a375411cf609db6f9a7ae83f164f6f2e66559a6dff5b92)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://0.0.0.0:10001/vuln/mal-2026-3659</id>
    <title>mal-2026-3659</title>
    <updated>2026-05-13T17:09:52.609143+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (cc191d72f2f92d966897d0f635b53afecd9a62e8b63de13fff125a00377fcb63)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</content>
    <link href="https://0.0.0.0:10001/vuln/mal-2026-3659"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (cc191d72f2f92d966897d0f635b53afecd9a62e8b63de13fff125a00377fcb63)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</summary>
  </entry>
</feed>
