MAL-2025-3439

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/ccxt-mexc-futures/MAL-2025-3439.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-3439
Published
2025-03-10T13:30:44Z
Modified
2026-03-19T12:51:37.061583Z
Summary
Malicious code in ccxt-mexc-futures (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (f2eb5eb75679b536c430ad6d5440e63fbe1d1cd391ab1abf2a411dae3a768ed8)

There is a hidden code that overwrites the default method and downloads remote data, which contains the dictionary pretending to be the right value, and a hidden code to exfiltrate machine ID and download and run a remote code.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-03-ccxt-mexc-futures

Reasons (based on the campaign):

  • obfuscation

  • Downloads and executes a remote malicious script.

  • action-hidden-in-lib-usage

Database specific
{
    "iocs": {
        "domains": [
            "update.mexc.workers.dev",
            "v3.mexc.workers.dev",
            "mexc.workers.dev"
        ],
        "urls": [
            "https://v3.mexc.workers.dev/describe.json",
            "https://update.mexc.workers.dev/"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-02500",
            "modified_time": "2025-04-23T16:06:18Z",
            "sha256": "f8948ced2172fde60eaa2844530b5eb6d7f7e1c3e46860ffe1787d069de422d5",
            "versions": [
                "0.1.4",
                "0.1.5",
                "0.1.6",
                "0.1.7",
                "0.1.8"
            ],
            "import_time": "2025-04-25T09:36:45.676518187Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2025-02560",
            "modified_time": "2025-05-22T12:33:27Z",
            "sha256": "b960a73138bba5d79c9eaf82de51d667fc6305ab577d2bea22bde2b3535461bc",
            "import_time": "2025-05-22T14:07:11.173664858Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-03-ccxt-mexc-futures/ccxt-mexc-futures",
            "modified_time": "2025-03-10T13:30:44Z",
            "sha256": "116fc2e7a8fe6b235f43036def48255cb8c8a75e7ad046f94155903e29403ca2",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T22:30:55.037404078Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-03-ccxt-mexc-futures/ccxt-mexc-futures",
            "modified_time": "2025-03-10T13:30:44Z",
            "sha256": "f2eb5eb75679b536c430ad6d5440e63fbe1d1cd391ab1abf2a411dae3a768ed8",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T23:07:18.045735101Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-03-ccxt-mexc-futures/ccxt-mexc-futures",
            "modified_time": "2025-03-10T13:30:44Z",
            "sha256": "f126fba8fb0e9d3ab356f93681fa35fcec759a2c6af2c6ab549e344ccfe85d38",
            "versions": [
                "0.1.4",
                "0.1.5",
                "0.1.6",
                "0.1.7",
                "0.1.8"
            ],
            "import_time": "2025-12-10T21:38:57.338883868Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2026-00181",
            "modified_time": "2026-03-18T12:12:17Z",
            "sha256": "ab711c6084603ee25b3619cb1e58fc0581b22e3a8ce3c15d13fa86252b12eafc",
            "import_time": "2026-03-19T12:19:32.640187643Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / ccxt-mexc-futures

Package

Name
ccxt-mexc-futures
View open source insights on deps.dev
Purl
pkg:pypi/ccxt-mexc-futures

Affected ranges

Affected versions

0.*
0.1.4
0.1.5
0.1.6
0.1.7
0.1.8

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/ccxt-mexc-futures/MAL-2025-3439.json"