MAL-2024-11661

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pplgdfhuighsdfyisfdty/MAL-2024-11661.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2024-11661
Published
2024-10-22T13:55:39Z
Modified
2025-12-12T20:46:17.193546Z
Summary
Malicious code in pplgdfhuighsdfyisfdty (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (a6da12f1a169dc997d18e49311bb47be99e753dca10106e2bde591c0618268d1)

Installing the package attempts to exfiltrate GCP tokens. As it uses a random names and/or targets specific accounts, it's most probably a (pen)test.


Category: PROBABLY_PENTEST - Packages looking like typical pentest packages, but also anything that looks like testing, exploring pre-prepared kits, research & co, with clearly low-harm possibilities.

Campaign: 2024-10-gal32fjdsbf89hnd-gcp-token

Reasons (based on the campaign):

  • exfiltration-cloud-tokens
Database specific
{
    "malicious-packages-origins": [
        {
            "source": "reversing-labs",
            "id": "RLMA-2024-11118",
            "versions": [
                "1"
            ],
            "sha256": "184915326647ad3b19088447e38959cbbc246318d52670da620086f3c2474b23",
            "modified_time": "2024-12-09T06:50:49Z",
            "import_time": "2024-12-09T14:38:47.041076624Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2024-10-gal32fjdsbf89hnd-gcp-token/pplgdfhuighsdfyisfdty",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "aaadf7c5d9b51f1e1471ff375bcbfeb88c72f46378dcf1fbf33e85f23bd04c6c",
            "modified_time": "2024-10-22T13:55:39Z",
            "import_time": "2025-12-02T22:30:56.309577065Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2024-10-gal32fjdsbf89hnd-gcp-token/pplgdfhuighsdfyisfdty",
            "ranges": [
                {
                    "type": "ECOSYSTEM",
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ]
                }
            ],
            "sha256": "a6da12f1a169dc997d18e49311bb47be99e753dca10106e2bde591c0618268d1",
            "modified_time": "2024-10-22T13:55:39Z",
            "import_time": "2025-12-02T23:07:19.49802988Z"
        },
        {
            "source": "kam193",
            "id": "pypi/2024-10-gal32fjdsbf89hnd-gcp-token/pplgdfhuighsdfyisfdty",
            "versions": [
                "1"
            ],
            "sha256": "0b41dcca8bb627a4f5bcc696eed782110f13efe482c7f6d793626cd23ae9d481",
            "modified_time": "2024-10-22T13:55:39Z",
            "import_time": "2025-12-10T21:38:58.612369389Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / pplgdfhuighsdfyisfdty

Package

Name
pplgdfhuighsdfyisfdty
View open source insights on deps.dev
Purl
pkg:pypi/pplgdfhuighsdfyisfdty

Affected ranges

Affected versions

Other

1

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pplgdfhuighsdfyisfdty/MAL-2024-11661.json"