{"id":"MAL-2026-2432","summary":"Malicious code in nwin64tls (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (72555231efbf126e61cb3aa59d3482bc7967af46898e46eb2b9b7f81af8cd40e)\nImporting the module starts a loop that listens to key strokes and on every capslock press exfiltrates screenshot to a hardcoded location.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-04-old-nwin32tls\n\n\nReasons (based on the campaign):\n\n\n - spyware-like\n","modified":"2026-04-02T21:12:06.543633Z","published":"2026-04-02T20:28:37Z","database_specific":{"malicious-packages-origins":[{"id":"pypi/2026-04-old-nwin32tls/nwin64tls","source":"kam193","sha256":"72555231efbf126e61cb3aa59d3482bc7967af46898e46eb2b9b7f81af8cd40e","versions":["0.0.1"],"modified_time":"2026-04-02T20:28:37.671144Z","import_time":"2026-04-02T20:47:26.853301096Z"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/nwin64tls"}],"affected":[{"package":{"name":"nwin64tls","ecosystem":"PyPI","purl":"pkg:pypi/nwin64tls"},"versions":["0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/nwin64tls/MAL-2026-2432.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}