{"id":"MAL-2025-6455","summary":"Malicious code in atlasctf-21-prod-18 (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (72fd975d0315a84c767eec715b401f9e6c3a3345b6f7ae0ed2ee435634fdf8af)\nOn installation or importing, the package attempts to exfiltrate some basic information, e.g. /etc/passwd\n\n\n---\n\nCategory: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.\n\n\nCampaign: 2025-06-atlasctf\n\n\nReasons (based on the campaign):\n\n\n - exfiltration-generic\n\n\n - The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n","modified":"2026-03-19T12:50:49.017956Z","published":"2025-06-07T14:05:45Z","database_specific":{"malicious-packages-origins":[{"versions":["99.99.99","99.99.99.1"],"modified_time":"2025-07-31T19:14:15Z","import_time":"2025-08-01T10:07:09.628287908Z","source":"reversing-labs","sha256":"c807950446025254ad7b1c17cc5d517f9a51bf6a898cfeaeb092fcb713a10c8f","id":"RLMA-2025-03540"},{"modified_time":"2025-06-07T14:05:45Z","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"import_time":"2025-12-02T22:30:55.859115794Z","source":"kam193","sha256":"ef1062a839b7d30fddb455779003533eb4edf71af6e92ca1a58b57ae60e982f1","id":"pypi/2025-06-atlasctf/atlasctf-21-prod-18"},{"modified_time":"2025-06-07T14:05:45Z","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"import_time":"2025-12-02T23:07:19.041613325Z","source":"kam193","sha256":"72fd975d0315a84c767eec715b401f9e6c3a3345b6f7ae0ed2ee435634fdf8af","id":"pypi/2025-06-atlasctf/atlasctf-21-prod-18"},{"versions":["99.99.99","99.99.99.1"],"modified_time":"2025-06-07T14:05:45Z","import_time":"2025-12-10T21:38:58.184293269Z","source":"kam193","sha256":"a9a029e1627828e44848c0f6a2b408ec7eea0eee93b797081ad5e35b2a004d53","id":"pypi/2025-06-atlasctf/atlasctf-21-prod-18"},{"modified_time":"2026-03-18T12:11:33Z","import_time":"2026-03-19T12:19:26.946264016Z","source":"reversing-labs","sha256":"e95b6c8da1c08d4bcca96a3e0f49fae5d45fff9a4da1853b72fb11b03512eb5e","id":"RLUA-2026-00113"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/atlasctf-21-prod-18"}],"affected":[{"package":{"name":"atlasctf-21-prod-18","ecosystem":"PyPI","purl":"pkg:pypi/atlasctf-21-prod-18"},"versions":["99.99.99","99.99.99.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/atlasctf-21-prod-18/MAL-2025-6455.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}