{"id":"MAL-2026-3398","summary":"Malicious code in ninja-ssh-proto (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (84f71e430b37d8fe0ee6c72826071159bb146664fe17d9a596f6e611579851f7)\nDuring installation or import, package silently adds a new authorized SSH key. It's closely related to the 2026-05-ninja-core-utils campaign, but there is no built-in crypto exfiltration.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-05-ninja-ssh-proto\n\n\nReasons (based on the campaign):\n\n\n - backdoor\n\n\n - obfuscation\n","modified":"2026-05-09T17:35:31.195141Z","published":"2026-05-08T15:45:53Z","database_specific":{"malicious-packages-origins":[{"id":"pypi/2026-05-ninja-ssh-proto/ninja-ssh-proto","source":"kam193","modified_time":"2026-05-08T15:45:53.374752Z","import_time":"2026-05-08T16:36:11.159735942Z","versions":["1.0.2","1.0.4"],"sha256":"31cd1b434d9ff5d9acc1dc1b668bae0aebff2a063dd30234f8b2294c1aba0f8e"},{"id":"pypi/2026-05-ninja-ssh-proto/ninja-ssh-proto","source":"kam193","modified_time":"2026-05-08T15:45:53.374752Z","import_time":"2026-05-09T17:23:17.195786299Z","versions":["1.0.2","1.0.4"],"sha256":"84f71e430b37d8fe0ee6c72826071159bb146664fe17d9a596f6e611579851f7"}],"iocs":{"urls":["http://144.126.142.148:5555/report"]}},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/ninja-ssh-proto"}],"affected":[{"package":{"name":"ninja-ssh-proto","ecosystem":"PyPI","purl":"pkg:pypi/ninja-ssh-proto"},"versions":["1.0.2","1.0.4"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/ninja-ssh-proto/MAL-2026-3398.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}