MAL-2025-1982

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mlc-ai-nightly-rocm62/MAL-2025-1982.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2025-1982
Published
2025-01-21T18:27:56Z
Modified
2025-12-12T20:45:17.120984Z
Summary
Malicious code in mlc-ai-nightly-rocm62 (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (d19b7d0a36e093c723972a96552235036df64fd3c5e2ba6bb85d979a4c65c00d)

Installing the package exfiltrates information about the host, including environmental variables.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2025-01-mlc-ai-nightly

Reasons (based on the campaign):

  • The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.

  • The package overrides the install command in setup.py to execute malicious code during installation.

  • exfiltration-env-variables

  • dependency-confusion

Database specific
{
    "iocs": {
        "domains": [
            "depcon.buzz"
        ]
    },
    "malicious-packages-origins": [
        {
            "import_time": "2025-03-03T15:07:15.943392982Z",
            "versions": [
                "9.9.9"
            ],
            "id": "RLMA-2025-01223",
            "sha256": "21e9ff8aa8baa2fa66566f09a96f812b7d158cb7d8570aea4f20a634e630dade",
            "source": "reversing-labs",
            "modified_time": "2025-03-03T13:45:01Z"
        },
        {
            "import_time": "2025-12-02T22:30:55.340705968Z",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/2025-01-mlc-ai-nightly/mlc-ai-nightly-rocm62",
            "sha256": "3accdd849420abc9915ec783d6e922f8d855863e4a6092e90648481d1c3fe530",
            "source": "kam193",
            "modified_time": "2025-01-21T18:27:56Z"
        },
        {
            "import_time": "2025-12-02T23:07:18.37021415Z",
            "ranges": [
                {
                    "events": [
                        {
                            "introduced": "0"
                        }
                    ],
                    "type": "ECOSYSTEM"
                }
            ],
            "id": "pypi/2025-01-mlc-ai-nightly/mlc-ai-nightly-rocm62",
            "sha256": "d19b7d0a36e093c723972a96552235036df64fd3c5e2ba6bb85d979a4c65c00d",
            "source": "kam193",
            "modified_time": "2025-01-21T18:27:56Z"
        },
        {
            "import_time": "2025-12-10T21:38:57.596207783Z",
            "versions": [
                "9.9.9"
            ],
            "id": "pypi/2025-01-mlc-ai-nightly/mlc-ai-nightly-rocm62",
            "sha256": "38c58eadf0180af4d0acfbd88c4e995475f9316a397bc7717f8d5132f1211d8f",
            "source": "kam193",
            "modified_time": "2025-01-21T18:27:56Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / mlc-ai-nightly-rocm62

Package

Name
mlc-ai-nightly-rocm62
View open source insights on deps.dev
Purl
pkg:pypi/mlc-ai-nightly-rocm62

Affected ranges

Affected versions

9.*

9.9.9

Database specific

source

"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/mlc-ai-nightly-rocm62/MAL-2025-1982.json"