MAL-2025-6455

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/atlasctf-21-prod-18/MAL-2025-6455.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2025-6455
Published
2025-06-07T14:05:45Z
Modified
2026-03-19T12:50:49.017956Z
Summary
Malicious code in atlasctf-21-prod-18 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (72fd975d0315a84c767eec715b401f9e6c3a3345b6f7ae0ed2ee435634fdf8af)

On installation or importing, the package attempts to exfiltrate some basic information, e.g. /etc/passwd


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: 2025-06-atlasctf

Reasons (based on the campaign):

  • exfiltration-generic

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

Database specific
{
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2025-03540",
            "modified_time": "2025-07-31T19:14:15Z",
            "sha256": "c807950446025254ad7b1c17cc5d517f9a51bf6a898cfeaeb092fcb713a10c8f",
            "versions": [
                "99.99.99",
                "99.99.99.1"
            ],
            "import_time": "2025-08-01T10:07:09.628287908Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-06-atlasctf/atlasctf-21-prod-18",
            "modified_time": "2025-06-07T14:05:45Z",
            "sha256": "ef1062a839b7d30fddb455779003533eb4edf71af6e92ca1a58b57ae60e982f1",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T22:30:55.859115794Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-06-atlasctf/atlasctf-21-prod-18",
            "modified_time": "2025-06-07T14:05:45Z",
            "sha256": "72fd975d0315a84c767eec715b401f9e6c3a3345b6f7ae0ed2ee435634fdf8af",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "import_time": "2025-12-02T23:07:19.041613325Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-06-atlasctf/atlasctf-21-prod-18",
            "modified_time": "2025-06-07T14:05:45Z",
            "sha256": "a9a029e1627828e44848c0f6a2b408ec7eea0eee93b797081ad5e35b2a004d53",
            "versions": [
                "99.99.99",
                "99.99.99.1"
            ],
            "import_time": "2025-12-10T21:38:58.184293269Z"
        },
        {
            "source": "reversing-labs",
            "id": "RLUA-2026-00113",
            "modified_time": "2026-03-18T12:11:33Z",
            "sha256": "e95b6c8da1c08d4bcca96a3e0f49fae5d45fff9a4da1853b72fb11b03512eb5e",
            "import_time": "2026-03-19T12:19:26.946264016Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / atlasctf-21-prod-18

Package

Name
atlasctf-21-prod-18
View open source insights on deps.dev
Purl
pkg:pypi/atlasctf-21-prod-18

Affected ranges

Affected versions

99.*
99.99.99
99.99.99.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/atlasctf-21-prod-18/MAL-2025-6455.json"