{"id":"MAL-2026-2841","summary":"Malicious code in lixxyly (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (e3c0a4fef6764ec743cc96d88d10dbc9a33197300a3b916746ab5f5391ad6e96)\nStarting the module activates a hardcoded telegram bot allowing remote code execution, data exfiltration, collecting webcam photos, clipboard data, etc.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-04-sher-net\n\n\nReasons (based on the campaign):\n\n\n - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.\n\n\n - rat\n\n\n - spyware-like\n","modified":"2026-04-17T11:34:31.304064Z","published":"2026-04-17T10:53:13Z","database_specific":{"malicious-packages-origins":[{"versions":["0.0.1"],"import_time":"2026-04-17T11:23:58.183660898Z","source":"kam193","sha256":"e3c0a4fef6764ec743cc96d88d10dbc9a33197300a3b916746ab5f5391ad6e96","modified_time":"2026-04-17T10:53:14.030633Z","id":"pypi/2026-04-sher-net/lixxyly"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/lixxyly"}],"affected":[{"package":{"name":"lixxyly","ecosystem":"PyPI","purl":"pkg:pypi/lixxyly"},"versions":["0.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/lixxyly/MAL-2026-2841.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}