{"id":"MAL-2026-3148","summary":"Malicious code in amazon-boto (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (649bb559f3078565515a9fee16dbe78e0d1b5575943cbaf020135f8e70e2f17d)\nWhen using the package, the given AWS credentials are silently exfiltrated to a hardcoded location. This incarnation of the long-running campaign was first flagged by OpenSourceMalware https://opensourcemalware.com/pypi/amazon-boto\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-08-aws-enumerate\n\n\nReasons (based on the campaign):\n\n\n - exfiltration-generic\n\n\n - action-hidden-in-lib-usage\n\n\n - exfiltration-credentials\n","modified":"2026-04-29T10:39:16.252359Z","published":"2026-04-29T08:58:04Z","database_specific":{"iocs":{"urls":["https://api.aliyun-sdk-requests.xyz/aws","https://github.com/kohlersbtuh15/accesskey_tools"],"domains":["api.aliyun-sdk-requests.xyz","aliyun-sdk-requests.xyz"]},"malicious-packages-origins":[{"source":"kam193","modified_time":"2026-04-29T08:58:04.515619Z","versions":["1.42.41","1.42.42"],"sha256":"649bb559f3078565515a9fee16dbe78e0d1b5575943cbaf020135f8e70e2f17d","id":"pypi/2025-08-aws-enumerate/amazon-boto","import_time":"2026-04-29T10:16:34.855312319Z"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/amazon-boto"}],"affected":[{"package":{"name":"amazon-boto","ecosystem":"PyPI","purl":"pkg:pypi/amazon-boto"},"versions":["1.42.41","1.42.42"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/amazon-boto/MAL-2026-3148.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}