MAL-2026-3402

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/python-bittensor-config-v2/MAL-2026-3402.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3402
Published
2026-05-09T17:09:02Z
Modified
2026-05-09T17:35:33.713058Z
Summary
Malicious code in python-bittensor-config-v2 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (6f2ecdbc9e024d6dc51c8e5d48941c5aac432db65ad733317aed159d480973cd)

During installation or import, package silently adds a new authorized SSH key. It's closely related to the 2026-05-ninja-core-utils campaign, but there is no built-in crypto exfiltration.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-05-ninja-ssh-proto

Reasons (based on the campaign):

  • backdoor

  • obfuscation

Database specific
{
    "iocs": {
        "urls": [
            "http://144.126.142.148:5555/report"
        ]
    },
    "malicious-packages-origins": [
        {
            "id": "pypi/2026-05-ninja-ssh-proto/python-bittensor-config-v2",
            "sha256": "6f2ecdbc9e024d6dc51c8e5d48941c5aac432db65ad733317aed159d480973cd",
            "import_time": "2026-05-09T17:23:17.196343198Z",
            "source": "kam193",
            "modified_time": "2026-05-09T17:09:02.960556Z",
            "versions": [
                "1.1.0"
            ]
        }
    ]
}
References
Credits

Affected packages

PyPI / python-bittensor-config-v2

Package

Name
python-bittensor-config-v2
View open source insights on deps.dev
Purl
pkg:pypi/python-bittensor-config-v2

Affected ranges

Affected versions

1.*
1.1.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/python-bittensor-config-v2/MAL-2026-3402.json"