MAL-2026-2841

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/lixxyly/MAL-2026-2841.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-2841
Published
2026-04-17T10:53:13Z
Modified
2026-04-17T11:34:31.304064Z
Summary
Malicious code in lixxyly (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (e3c0a4fef6764ec743cc96d88d10dbc9a33197300a3b916746ab5f5391ad6e96)

Starting the module activates a hardcoded telegram bot allowing remote code execution, data exfiltration, collecting webcam photos, clipboard data, etc.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-04-sher-net

Reasons (based on the campaign):

  • The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

  • rat

  • spyware-like

Database specific
{
    "malicious-packages-origins": [
        {
            "sha256": "e3c0a4fef6764ec743cc96d88d10dbc9a33197300a3b916746ab5f5391ad6e96",
            "id": "pypi/2026-04-sher-net/lixxyly",
            "source": "kam193",
            "modified_time": "2026-04-17T10:53:14.030633Z",
            "import_time": "2026-04-17T11:23:58.183660898Z",
            "versions": [
                "0.0.1"
            ]
        }
    ]
}
References
Credits

Affected packages

PyPI / lixxyly

Package

Affected ranges

Affected versions

0.*
0.0.1

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/lixxyly/MAL-2026-2841.json"