{"id":"MAL-2026-2431","summary":"Malicious code in nwin32tls (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (a47778618cad57dbc584afdff7ed138032b69c423a9812e1bc8f86c13129f01d)\nImporting the module starts a loop that listens to key strokes and on every capslock press exfiltrates screenshot to a hardcoded location.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-04-old-nwin32tls\n\n\nReasons (based on the campaign):\n\n\n - spyware-like\n","modified":"2026-04-02T21:06:29.403909Z","published":"2026-04-02T20:26:19Z","database_specific":{"malicious-packages-origins":[{"source":"kam193","versions":["0.0.1","0.0.2","0.0.3","0.0.5","0.0.6","0.0.7"],"id":"pypi/2026-04-old-nwin32tls/nwin32tls","sha256":"a47778618cad57dbc584afdff7ed138032b69c423a9812e1bc8f86c13129f01d","modified_time":"2026-04-02T20:26:19.105445Z","import_time":"2026-04-02T20:47:26.849020058Z"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/nwin32tls"}],"affected":[{"package":{"name":"nwin32tls","ecosystem":"PyPI","purl":"pkg:pypi/nwin32tls"},"versions":["0.0.1","0.0.2","0.0.3","0.0.5","0.0.6","0.0.7"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/nwin32tls/MAL-2026-2431.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}