<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent entries from ossf_malicious_packages</title>
    <link>https://0.0.0.0:10001</link>
    <description>Contains only the most 10 recent entries.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 May 2026 18:25:10 +0000</lastBuildDate>
    <item>
      <title>mal-2026-3657</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3657</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (fef1582aa7fb15599bd48e6f077be4d1a577d3916cf2c2650893f0406ede8ea3)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (fef1582aa7fb15599bd48e6f077be4d1a577d3916cf2c2650893f0406ede8ea3)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3657</guid>
    </item>
    <item>
      <title>mal-2026-3656</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3656</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (44f072eff9ef90a204331ae1a03c5c4296929dbf88a05fff1a529e397548421a)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (44f072eff9ef90a204331ae1a03c5c4296929dbf88a05fff1a529e397548421a)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3656</guid>
    </item>
    <item>
      <title>mal-2026-3658</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3658</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (04d9f5ba202651d252a375411cf609db6f9a7ae83f164f6f2e66559a6dff5b92)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (04d9f5ba202651d252a375411cf609db6f9a7ae83f164f6f2e66559a6dff5b92)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3658</guid>
    </item>
    <item>
      <title>mal-2026-3659</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3659</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (cc191d72f2f92d966897d0f635b53afecd9a62e8b63de13fff125a00377fcb63)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (cc191d72f2f92d966897d0f635b53afecd9a62e8b63de13fff125a00377fcb63)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3659</guid>
    </item>
    <item>
      <title>mal-2026-3662</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3662</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (2bd2bd26870d2cf5df73c69bca7ed9088604eccf44727e4c59f0301cc8ccd35a)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (2bd2bd26870d2cf5df73c69bca7ed9088604eccf44727e4c59f0301cc8ccd35a)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3662</guid>
    </item>
    <item>
      <title>mal-2026-3661</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3661</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (34c3e3d51b95102fd72f00c2b6c4bce7e34a801326dfbe7557f2d4346ed37508)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (34c3e3d51b95102fd72f00c2b6c4bce7e34a801326dfbe7557f2d4346ed37508)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3661</guid>
    </item>
    <item>
      <title>mal-2026-3660</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3660</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (a1e0009e8bfad1a403632094f43e661b328b40a6f518db00b890712789e39734)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (a1e0009e8bfad1a403632094f43e661b328b40a6f518db00b890712789e39734)
Package installs persistent malware acting as Rat, with the focus of stealing data and modifying copied cryptowallet addresses.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-py-requests


Reasons (based on the campaign):


 - rat


 - typosquatting


 - persistence


 - Downloads and executes a remote malicious script.


 - crypto-related


 - clipboard-modify


 - exfiltration-browser-data


 - exfiltration-crypto


 - infostealer
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3660</guid>
    </item>
    <item>
      <title>mal-2026-3663</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3663</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (c7439a1ad4a50c3852597bd31aaf7a3f15c53c2cb9f124b9b350e55517b5f592)
The OpenSSF Package Analysis project identified 'chia-network' @ 1.0.0 (npm) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (c7439a1ad4a50c3852597bd31aaf7a3f15c53c2cb9f124b9b350e55517b5f592)
The OpenSSF Package Analysis project identified 'chia-network' @ 1.0.0 (npm) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3663</guid>
    </item>
    <item>
      <title>mal-2026-3664</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3664</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (3e553fe0eea72dc43eab2696330acd6fbb3e4de8c95529eab6298411620c0c9f)
Package installs malware identified as a backdoor or reverse shell.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-workingitmehelpit


Reasons (based on the campaign):


 - The package overrides the install command in setup.py to execute malicious code during installation.


 - malware


 - backdoor
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (3e553fe0eea72dc43eab2696330acd6fbb3e4de8c95529eab6298411620c0c9f)
Package installs malware identified as a backdoor or reverse shell.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-workingitmehelpit


Reasons (based on the campaign):


 - The package overrides the install command in setup.py to execute malicious code during installation.


 - malware


 - backdoor
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3664</guid>
    </item>
    <item>
      <title>mal-2026-3665</title>
      <link>https://0.0.0.0:10001/vuln/mal-2026-3665</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (cf12b321da2b42ce2302bdccbb35304c4f4a47c7a5e273076467b269982c480f)
Package automatically exfiltrate information about the system, including potentially sensitive data.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-hackling


Reasons (based on the campaign):


 - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.


 - exfiltration-env-variables
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (cf12b321da2b42ce2302bdccbb35304c4f4a47c7a5e273076467b269982c480f)
Package automatically exfiltrate information about the system, including potentially sensitive data.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-05-hackling


Reasons (based on the campaign):


 - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.


 - exfiltration-env-variables
</content:encoded>
      <guid isPermaLink="false">https://0.0.0.0:10001/vuln/mal-2026-3665</guid>
    </item>
  </channel>
</rss>
