MAL-2026-3148

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/amazon-boto/MAL-2026-3148.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3148
Published
2026-04-29T08:58:04Z
Modified
2026-04-29T10:39:16.252359Z
Summary
Malicious code in amazon-boto (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (649bb559f3078565515a9fee16dbe78e0d1b5575943cbaf020135f8e70e2f17d)

When using the package, the given AWS credentials are silently exfiltrated to a hardcoded location. This incarnation of the long-running campaign was first flagged by OpenSourceMalware https://opensourcemalware.com/pypi/amazon-boto


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-08-aws-enumerate

Reasons (based on the campaign):

  • exfiltration-generic

  • action-hidden-in-lib-usage

  • exfiltration-credentials

Database specific
{
    "iocs": {
        "domains": [
            "api.aliyun-sdk-requests.xyz",
            "aliyun-sdk-requests.xyz"
        ],
        "urls": [
            "https://api.aliyun-sdk-requests.xyz/aws",
            "https://github.com/kohlersbtuh15/accesskey_tools"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "kam193",
            "modified_time": "2026-04-29T08:58:04.515619Z",
            "sha256": "649bb559f3078565515a9fee16dbe78e0d1b5575943cbaf020135f8e70e2f17d",
            "import_time": "2026-04-29T10:16:34.855312319Z",
            "versions": [
                "1.42.41",
                "1.42.42"
            ],
            "id": "pypi/2025-08-aws-enumerate/amazon-boto"
        }
    ]
}
References
Credits

Affected packages

PyPI / amazon-boto

Package

Affected ranges

Affected versions

1.*
1.42.41
1.42.42

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/amazon-boto/MAL-2026-3148.json"