MAL-2025-3000

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/solders-utils/MAL-2025-3000.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-3000
Published
2025-02-21T21:50:10Z
Modified
2026-03-19T12:57:02.855404Z
Summary
Malicious code in solders-utils (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (eff6c26674dd4f0408742c46785656c3a5d19ca0a87366a60534d37d5a54e687)

The only thing the package does is send out all the given data about a cryptocurrency transaction, including the private key, to a hardcoded webhook.

Feedback from PyPI Team: the package "transaction-utils" may also exploit a known pip behavior to overwrite files of an existing legitime package and replace it with malicious content.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-02-transaction-utils

Reasons (based on the campaign):

  • crypto-related

  • action-hidden-in-lib-usage

  • A Telegram webhook is used to send collected data.

Database specific
{
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-01999",
            "modified_time": "2025-03-28T13:06:16Z",
            "sha256": "5c8e346305384f94d637742b5acac9fe706eacca5bfb47be549338efa6f2abb0",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2025-03-31T07:07:06.758949622Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-02-transaction-utils/solders-utils",
            "modified_time": "2025-02-21T21:50:10Z",
            "sha256": "cc67f0fb839600d6c9595c6e1c782d58f363987a56d0c739d96e3dcab09b8036",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T22:30:55.599547676Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-02-transaction-utils/solders-utils",
            "modified_time": "2025-02-21T21:50:10Z",
            "sha256": "eff6c26674dd4f0408742c46785656c3a5d19ca0a87366a60534d37d5a54e687",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T23:07:18.638897995Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-02-transaction-utils/solders-utils",
            "modified_time": "2025-02-21T21:50:10Z",
            "sha256": "1de48d4db6755f2ac7b7280995e8b326ce9ae224577913713623e31355e8b133",
            "versions": [
                "0.1.1"
            ],
            "import_time": "2025-12-10T21:38:57.833108292Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2026-00771",
            "modified_time": "2026-03-18T12:18:56Z",
            "sha256": "eb4fb9c4ad72103e27553a1b780fcd33a8e6fbbf6277b575ab1997504a5f6e07",
            "import_time": "2026-03-19T12:20:28.923943405Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / solders-utils

Package

Affected ranges

Affected versions

0.*
0.1.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/solders-utils/MAL-2025-3000.json"