MAL-2023-8351

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/aliababcloud-tea-openapi/MAL-2023-8351.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-8351
Published
2023-09-11T06:09:09Z
Modified
2023-10-16T05:42:04Z
Summary
Malicious code in aliababcloud-tea-openapi (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: checkmarx (644686188e6f43d2dc595074d7644cba060e6a91b8de18713f4b551a76a6c3b7)

Malicious Typosquatting packages campaign targeting developers, steals cloud service credentials

Source: google-open-source-security (17af179e4e4c480da72b929fd55055b95fc141dbd860450e9553e70a296166aa)

Attack targeted at users of Alibaba, AWS and Telegram via malicious packages published to PyPI.

The malicious code was hidden in strategicly chosen functions and would only trigger when these functions were called. The malicious code does not automatically run on install or import, helping the packages evade detection.

References
Credits

Affected packages

PyPI / aliababcloud-tea-openapi

Package

Name
aliababcloud-tea-openapi
View open source insights on deps.dev
Purl
pkg:pypi/aliababcloud-tea-openapi

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected