{"id":"MAL-2026-2488","summary":"Malicious code in photo-extractor (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (67f3f604528f125e85fb7be00bb17d7cf2abc5cdb20a12cbcbb38633f5877f14)\nClones of legitimate libraries with malicious modifications intended to download malicious remote code. The remote script allows executing arbitrary files through a Telegram as C2 channel. The package installs a generic entry point triggering malicious action.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-pipipipi\n\n\nReasons (based on the campaign):\n\n\n - clones-real-package\n\n\n - rat\n\n\n - Downloads and executes a remote malicious script.\n\n\n - typosquatting\n","modified":"2026-04-04T17:16:50.567674Z","published":"2026-04-04T16:41:48Z","database_specific":{"iocs":{"urls":["https://tinyurl.com/47h5bmcw","https://www.dropbox.com/scl/fi/ybqsqvbquwbk9h59aottq/shadowsocksvpn.ps1?rlkey=2huygpgfs1pmasr9h70tr9zti&st=1ghv9gld&dl=1"]},"malicious-packages-origins":[{"source":"kam193","import_time":"2026-04-04T17:13:04.997656216Z","sha256":"67f3f604528f125e85fb7be00bb17d7cf2abc5cdb20a12cbcbb38633f5877f14","versions":["2.33.0"],"id":"pypi/2026-03-pipipipi/photo-extractor","modified_time":"2026-04-04T16:41:48.299293Z"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/photo-extractor"}],"affected":[{"package":{"name":"photo-extractor","ecosystem":"PyPI","purl":"pkg:pypi/photo-extractor"},"versions":["2.33.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/photo-extractor/MAL-2026-2488.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}