MAL-2026-3083

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/elementary-data/MAL-2026-3083.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3083
Published
2026-04-24T22:54:25Z
Modified
2026-04-27T14:31:54.916653Z
Summary
Malicious code in elementary-data (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (96dc65f67f54411d3de6b23a33a8f73665e2703d7261b7f1720cdc089c528eea)

Versions 0.23.3 were compromised.

A threat actor exploited a vulnerability in the CI workflows to inject code and establish, likely, a reverse shell in the CI environment (https://github.com/elementary-data/elementary/actions/runs/24914128534/job/72962412074). Following that, the access was used to create 3 PRs with malicious code, and finally publish the malicious 0.23.3 version of the elementary-data package to PyPI, which was available between 2026-04-24 22:20 and 2026-04-25 9:45 (UTC) (https://github.com/elementary-data/elementary/actions/runs/24914446630). Malicious code was also published as a Docker image.

Malicious code was inserted in a PTH file, causing execution on any Python run. It then collects all kinds of sensitive data (credentials, .env files, cloud tokens, cryptocurrency wallets, Kubernetes configurations, shell history, data from AWS secret manager, ...) and exfiltrates to the hardcoded target.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-04-compr-elementary-data

Reasons (based on the campaign):

  • files-exfiltration

  • exfiltration-generic

  • exfiltration-ssh-keys

  • obfuscation

  • exfiltration-cloud-tokens

  • exfiltration-crypto

  • exfiltration-credentials

  • compromised-package

  • exploited-ci-vulnerability

Source: ossf-package-analysis (83f9b178b520d3ad8b49bc9ea2b454eacf64fc302ec42aff6f90a1245af299e9)

The OpenSSF Package Analysis project identified 'elementary-data' @ 0.23.3 (pypi) as malicious.

It is considered malicious because:

  • The package executes one or more commands associated with malicious behavior.
Database specific
{
    "iocs": {
        "domains": [
            "igotnofriendsonlineorirl-imgonnakmslmao.skyhanni.cloud"
        ],
        "urls": [
            "https://litter.catbox.moe/iqesmbhukgd2c7hq.sh"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "ossf-package-analysis",
            "modified_time": "2026-04-24T22:54:25Z",
            "sha256": "83f9b178b520d3ad8b49bc9ea2b454eacf64fc302ec42aff6f90a1245af299e9",
            "import_time": "2026-04-27T01:40:39.824783003Z",
            "versions": [
                "0.23.3"
            ]
        },
        {
            "source": "kam193",
            "modified_time": "2026-04-27T09:33:07Z",
            "sha256": "96dc65f67f54411d3de6b23a33a8f73665e2703d7261b7f1720cdc089c528eea",
            "import_time": "2026-04-27T10:18:08.146234082Z",
            "versions": [
                "0.23.3"
            ],
            "id": "pypi/2026-04-compr-elementary-data/elementary-data"
        },
        {
            "source": "kam193",
            "modified_time": "2026-04-27T09:33:07Z",
            "sha256": "fcb538f8a937dd2e97532899be80827772aa99f0523c582aef301682d6e96b75",
            "import_time": "2026-04-27T12:05:07.441280295Z",
            "versions": [
                "0.23.3"
            ],
            "id": "pypi/2026-04-compr-elementary-data/elementary-data"
        },
        {
            "source": "kam193",
            "modified_time": "2026-04-27T09:33:07Z",
            "sha256": "cc802c0d8b918c99b39f26f473e8090b7073d45268b399df2e2ff5d5549c2a37",
            "import_time": "2026-04-27T14:17:06.155740851Z",
            "versions": [
                "0.23.3"
            ],
            "id": "pypi/2026-04-compr-elementary-data/elementary-data"
        }
    ]
}
References
Credits

Affected packages

PyPI / elementary-data

Package

Affected ranges

Affected versions

0.*
0.23.3

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/elementary-data/MAL-2026-3083.json"