{"id":"MAL-2026-2694","summary":"Malicious code in cpu-optimizers (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (f82b75da107c50f4d2f3cf5587e7db58a0dc91b77f8511226ff9219623dc145a)\nClones of legitimate libraries with malicious modifications intended to download malicious remote code. The remote script allows executing arbitrary files through a Telegram as C2 channel. The package installs a generic entry point triggering malicious action.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-03-pipipipi\n\n\nReasons (based on the campaign):\n\n\n - clones-real-package\n\n\n - rat\n\n\n - Downloads and executes a remote malicious script.\n\n\n - typosquatting\n","modified":"2026-04-15T17:02:44.906592Z","published":"2026-04-15T16:18:21Z","database_specific":{"iocs":{"urls":["https://tinyurl.com/47h5bmcw","https://www.dropbox.com/scl/fi/ybqsqvbquwbk9h59aottq/shadowsocksvpn.ps1?rlkey=2huygpgfs1pmasr9h70tr9zti&st=1ghv9gld&dl=1"]},"malicious-packages-origins":[{"source":"kam193","id":"pypi/2026-03-pipipipi/cpu-optimizers","modified_time":"2026-04-15T16:18:21.972733Z","sha256":"f82b75da107c50f4d2f3cf5587e7db58a0dc91b77f8511226ff9219623dc145a","versions":["2.33.0"],"import_time":"2026-04-15T16:52:38.970418308Z"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/cpu-optimizers"}],"affected":[{"package":{"name":"cpu-optimizers","ecosystem":"PyPI","purl":"pkg:pypi/cpu-optimizers"},"versions":["2.33.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/cpu-optimizers/MAL-2026-2694.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}