MAL-2025-3468

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/runwifi/MAL-2025-3468.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-3468
Published
2025-03-31T12:54:29Z
Modified
2026-03-19T12:57:03.223288Z
Summary
Malicious code in runwifi (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (83046dbbe0f24ed7ffb9087d78c161e332436c45f2f3f4433606ebb9fd9cc52d)

Running the module will exfiltrate files from the current directory


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-03-randomwifi

Reasons (based on the campaign):

  • files-exfiltration

  • typosquatting

Database specific
{
    "malicious-packages-origins": [
        {
            "id": "RLMA-2025-02532",
            "sha256": "b7ff8ad82dd659963c63b4445217c30c084118079879d2f0137b0e25518be590",
            "source": "reversing-labs",
            "versions": [
                "3.8.5.1"
            ],
            "modified_time": "2025-04-23T16:06:39Z",
            "import_time": "2025-04-25T09:36:48.287543503Z"
        },
        {
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2025-03-randomwifi/runwifi",
            "sha256": "1e31c27d94f4aa674279c8c9f3a8a8b6edf1cb710734c76b284a2f20062b0980",
            "source": "kam193",
            "modified_time": "2025-03-31T12:54:29Z",
            "import_time": "2025-12-02T22:30:55.558303735Z"
        },
        {
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "id": "pypi/2025-03-randomwifi/runwifi",
            "sha256": "83046dbbe0f24ed7ffb9087d78c161e332436c45f2f3f4433606ebb9fd9cc52d",
            "source": "kam193",
            "modified_time": "2025-03-31T12:54:29Z",
            "import_time": "2025-12-02T23:07:18.600695554Z"
        },
        {
            "id": "pypi/2025-03-randomwifi/runwifi",
            "sha256": "351e9031f2ccfe9287b2a46a2327f1e24d9bd2465f5cbe665317961b0bf4d7a4",
            "source": "kam193",
            "versions": [
                "3.8.5.1"
            ],
            "modified_time": "2025-03-31T12:54:29Z",
            "import_time": "2025-12-10T21:38:57.804356213Z"
        },
        {
            "id": "RLUA-2026-00740",
            "sha256": "6d9080e1d994db74c46850ccae2cec1597e802abc0e54b96c0cbc60fa6885d87",
            "source": "reversing-labs",
            "modified_time": "2026-03-18T12:18:36Z",
            "import_time": "2026-03-19T12:20:25.836847348Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / runwifi

Package

Affected ranges

Affected versions

3.*
3.8.5.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/runwifi/MAL-2025-3468.json"