{"id":"MAL-2026-3248","summary":"Malicious code in pwn-control (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (719b4c85917a0a8bc84e7591598b0d17098dd32c8f29b5c09eb25fe1d3e079c3)\nDuring installation, the code runs code to silently control the device via Telegram bot (execute commands, exfiltrate files).\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-05-system-update-tool\n\n\nReasons (based on the campaign):\n\n\n - rat\n\n\n - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.\n\n\n - files-exfiltration\n\n\n - peristence-autorun\n\n\n - persistence\n\n\n - impersonation\n","modified":"2026-05-03T14:32:43.094338Z","published":"2026-05-03T13:49:59Z","database_specific":{"malicious-packages-origins":[{"versions":["1.0"],"modified_time":"2026-05-03T13:49:59.156482Z","sha256":"719b4c85917a0a8bc84e7591598b0d17098dd32c8f29b5c09eb25fe1d3e079c3","id":"pypi/2026-05-system-update-tool/pwn-control","import_time":"2026-05-03T14:23:32.593662107Z","source":"kam193"}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/pwn-control"}],"affected":[{"package":{"name":"pwn-control","ecosystem":"PyPI","purl":"pkg:pypi/pwn-control"},"versions":["1.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pwn-control/MAL-2026-3248.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}