{"id":"MAL-2026-506","summary":"Malicious code in selenium-integration (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (50120169fb4cd982eb19b5dee69b1aa881d250d6bab46aaadb2746b92f0ec158)\nWhen importing the module, code downloads and executes a highly obfuscated remote script.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-01-system-integration\n\n\nReasons (based on the campaign):\n\n\n - Downloads and executes a remote malicious script.\n\n\n - obfuscation\n","modified":"2026-01-25T17:17:56.696121Z","published":"2026-01-25T16:56:33Z","database_specific":{"iocs":{"domains":["juvenile-server.vercel.app","helper-dun-seven.vercel.app"],"urls":["https://juvenile-server.vercel.app/program","https://juvenile-server.vercel.app/program.bat","https://helper-dun-seven.vercel.app/svc.bat"]},"malicious-packages-origins":[{"source":"kam193","sha256":"50120169fb4cd982eb19b5dee69b1aa881d250d6bab46aaadb2746b92f0ec158","modified_time":"2026-01-25T16:56:33.233793Z","id":"pypi/2026-01-system-integration/selenium-integration","import_time":"2026-01-25T17:06:33.081339588Z","versions":["1.0.1"]}]},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/selenium-integration"}],"affected":[{"package":{"name":"selenium-integration","ecosystem":"PyPI","purl":"pkg:pypi/selenium-integration"},"versions":["1.0.1"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/selenium-integration/MAL-2026-506.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}