{"id":"MAL-2026-2298","summary":"Malicious code in hiveos-sdk (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (6d040e58dddde324da836a19a41eb5c65698ef869ed3e534f662136f1fb48440)\nClones of legitimate libraries with malicious modifications intended to download malicious remote code. The remote script allows executing arbitrary files through a Telegram as C2 channel. The package installs a generic entry point triggering malicious action.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-pipipipi\n\n\nReasons (based on the campaign):\n\n\n - clones-real-package\n\n\n - rat\n\n\n - Downloads and executes a remote malicious script.\n\n\n - typosquatting\n","modified":"2026-03-30T12:32:17.945730Z","published":"2026-03-30T11:55:02Z","database_specific":{"iocs":{"urls":["https://tinyurl.com/47h5bmcw","https://www.dropbox.com/scl/fi/ybqsqvbquwbk9h59aottq/shadowsocksvpn.ps1?rlkey=2huygpgfs1pmasr9h70tr9zti&st=1ghv9gld&dl=1"]},"malicious-packages-origins":[{"id":"pypi/2026-03-pipipipi/hiveos-sdk","versions":["2.33.0"],"modified_time":"2026-03-30T11:55:02.314894Z","sha256":"6d040e58dddde324da836a19a41eb5c65698ef869ed3e534f662136f1fb48440","import_time":"2026-03-30T12:26:09.308090261Z","source":"kam193"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/hiveos-sdk"}],"affected":[{"package":{"name":"hiveos-sdk","ecosystem":"PyPI","purl":"pkg:pypi/hiveos-sdk"},"versions":["2.33.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/hiveos-sdk/MAL-2026-2298.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}