{"id":"MAL-2026-825","summary":"Malicious code in devtools-webhook-cicd-utils (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (807557cb6ac51aece00eeb28f55b89815176c95172780dcdded46b667f843771)\nDuring installation, package installs a script that listens for remote commands and executes them. The script is also added to autostart configuration and disguised as system application\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-02-devtools-webhook-cicd-utils\n\n\nReasons (based on the campaign):\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n\n - peristence-autorun\n\n\n - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.\n\n\n - obfuscation\n","modified":"2026-02-10T08:56:16.468422Z","published":"2026-02-10T07:42:45Z","database_specific":{"malicious-packages-origins":[{"modified_time":"2026-02-10T07:42:45.225273Z","source":"kam193","id":"pypi/2026-02-devtools-webhook-cicd-utils/devtools-webhook-cicd-utils","sha256":"807557cb6ac51aece00eeb28f55b89815176c95172780dcdded46b667f843771","versions":["1.4.7","1.5.0","1.5.1","1.6.0"],"import_time":"2026-02-10T08:20:58.665281586Z"}],"iocs":{"ips":["77.246.103.245"]}},"references":[{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/devtools-webhook-cicd-utils"}],"affected":[{"package":{"name":"devtools-webhook-cicd-utils","ecosystem":"PyPI","purl":"pkg:pypi/devtools-webhook-cicd-utils"},"versions":["1.4.7","1.5.0","1.5.1","1.6.0"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/devtools-webhook-cicd-utils/MAL-2026-825.json"}}],"schema_version":"1.7.3","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"REPORTER"}]}