MAL-2026-1288

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/arnavtest123/MAL-2026-1288.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-1288
Published
2026-03-08T19:01:20Z
Modified
2026-03-08T19:46:23.469148Z
Summary
Malicious code in arnavtest123 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (d77a638a8dbd52def0458fe1227c5dd5491bc8fedb0ae9e50f28eed74e4ef89d)

During installation, the package starts a reverse shell


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-02-jwrincident

Reasons (based on the campaign):

  • The package contains code to create a reverse shell, allowing an attacker to execute any commands on the victim's machine.
Database specific
{
    "malicious-packages-origins": [
        {
            "versions": [
                "1.0.1"
            ],
            "modified_time": "2026-03-08T19:01:20.352596Z",
            "sha256": "d77a638a8dbd52def0458fe1227c5dd5491bc8fedb0ae9e50f28eed74e4ef89d",
            "id": "pypi/2026-02-jwrincident/arnavtest123",
            "import_time": "2026-03-08T19:39:06.416736117Z",
            "source": "kam193"
        }
    ],
    "iocs": {
        "ips": [
            "108.143.253.126",
            "4.242.58.206"
        ]
    }
}
References
Credits

Affected packages

PyPI / arnavtest123

Package

Affected ranges

Affected versions

1.*
1.0.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/arnavtest123/MAL-2026-1288.json"