MAL-2026-686

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/tableapys/MAL-2026-686.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-686
Published
2026-02-03T07:49:06Z
Modified
2026-03-13T06:51:05.964737Z
Summary
Malicious code in tableapys (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (2aff2faef3705b6233a6df3d6b39f4f9b88ff522aa7c343cd8d36eb1a40405d6)

Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-11-spellcheckers

Reasons (based on the campaign):

  • obfuscation

  • Downloads and executes a remote malicious script.

  • The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.

Database specific
{
    "iocs": {
        "domains": [
            "dothebest.store",
            "searchbox.info",
            "updatenet.work"
        ],
        "urls": [
            "https://dothebest.store/allow/inform.php",
            "https://dothebest.store/refresh.php",
            "https://searchbox.info/prefer.php",
            "https://updatenet.work/settings/history.php",
            "https://dothebest.store/allow"
        ]
    },
    "malicious-packages-origins": [
        {
            "source": "kam193",
            "id": "pypi/2025-11-spellcheckers/tableapys",
            "modified_time": "2026-02-03T07:49:06.03512Z",
            "sha256": "2aff2faef3705b6233a6df3d6b39f4f9b88ff522aa7c343cd8d36eb1a40405d6",
            "versions": [
                "1.0.1"
            ],
            "import_time": "2026-02-03T08:16:11.144409989Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-11-spellcheckers/tableapys",
            "modified_time": "2026-02-03T08:54:16.747432Z",
            "sha256": "00d8d6a2fd4bace6ebfa74bf4183560d559e529aa4b26d87af7e8c58bbd95396",
            "versions": [
                "1.0.1",
                "1.0.2"
            ],
            "import_time": "2026-02-03T09:17:29.120302599Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2025-11-spellcheckers/tableapys",
            "modified_time": "2026-02-03T08:54:16.747432Z",
            "sha256": "c75062785285b61734acfed9313383e8bd8101bf7399b7246fd2d24100419ddb",
            "versions": [
                "1.0.1",
                "1.0.2"
            ],
            "import_time": "2026-03-11T10:47:48.528163251Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / tableapys

Package

Affected ranges

Affected versions

1.*
1.0.1
1.0.2

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/tableapys/MAL-2026-686.json"