RUSTSEC-2026-0102

Source
https://rustsec.org/advisories/RUSTSEC-2026-0102
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0102.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2026-0102
Published
2026-04-13T12:00:00Z
Modified
2026-04-15T21:45:06.966176Z
Summary
`microsoftsystem64` was removed from crates.io for malicious code
Details

microsoftsystem64 installs a hardcoded SSH authorized_keys entry (persistence/backdoor) and scans for sensitive files (.env, credential-like JSON names, keyword-matching docs), reads their contents, base64-encodes where needed, and exfiltrates everything to a remote server via HTTP. It also packages and uploads Telegram Desktop tdata, indicating targeted credential/session/data harvesting.

The malicious crate had 9 versions published on 2026-04-09 that had a total of 6346 downloads. There were no crates depending on this crate on crates.io.

Thanks to Socket.dev and sitsh for detecting and reporting this to the crates.io team!

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / microsoftsystem64

Package

Name
microsoftsystem64
View open source insights on deps.dev
Purl
pkg:cargo/microsoftsystem64

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0

Ecosystem specific

{
    "affects": {
        "functions": [],
        "arch": [],
        "os": []
    },
    "affected_functions": null
}

Database specific

informational
null
categories
[
    "malicious"
]
cvss
null
source
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0102.json"