{"id":"MAL-2026-3131","summary":"Malicious code in kcvlib (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (4a441a8e0abdd54964ca9e0a5e3a1d0e0c0435f05d80ab9e9210e10194a16f3d)\nDuring import, the package downloads and executes obfuscated code. It appears to be an infostealer framework\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-04-kcvlib\n\n\nReasons (based on the campaign):\n\n\n - obfuscation\n\n\n - Downloads and executes a remote malicious script.\n\n\n - infostealer\n","modified":"2026-04-28T18:17:00.087783Z","published":"2026-04-28T17:24:08Z","database_specific":{"iocs":{"urls":["https://raw.githubusercontent.com/ovrlust/cookie-library/main/kcvlib_core.py"]},"malicious-packages-origins":[{"versions":["1.0.0","1.0.1","1.1.0","1.2.0","1.2.1","1.3.0","1.4.0"],"modified_time":"2026-04-28T17:24:08.983645Z","import_time":"2026-04-28T18:03:33.623587036Z","sha256":"4a441a8e0abdd54964ca9e0a5e3a1d0e0c0435f05d80ab9e9210e10194a16f3d","source":"kam193","id":"pypi/2026-04-kcvlib/kcvlib"}]},"references":[{"type":"WEB","url":"https://github.com/ovrlust/cookie-library/tree/985f8b10041887590b65f1ca107e4ac9f85a54dd"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/kcvlib"}],"affected":[{"package":{"name":"kcvlib","ecosystem":"PyPI","purl":"pkg:pypi/kcvlib"},"versions":["1.0.0","1.0.1","1.1.0","1.2.0","1.2.1","1.3.0","1.4.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/kcvlib/MAL-2026-3131.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}