MAL-2023-8369

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/telethon2/MAL-2023-8369.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2023-8369
Published
2023-09-21T07:18:08Z
Modified
2023-10-16T05:42:04Z
Summary
Malicious code in telethon2 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: checkmarx (2f513e1bd0172cda035284efad9368870bc46158926c112ccd7fc881e6af75be)

Malicious Typosquatting packages campaign targeting developers, steals cloud service credentials

Source: google-open-source-security (9308df1a062441007b83384d6d5c1b9103eeae76a21599ea43aeaae5e839b243)

Attack targeted at users of Alibaba, AWS and Telegram via malicious packages published to PyPI.

The malicious code was hidden in strategicly chosen functions and would only trigger when these functions were called. The malicious code does not automatically run on install or import, helping the packages evade detection.

References
Credits

Affected packages

PyPI / telethon2

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected