MAL-2026-2233

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/lightmock/MAL-2026-2233.json
JSON Data
https://api.test.osv.dev/v1/vulns/MAL-2026-2233
Published
2026-03-26T08:27:10Z
Modified
2026-03-26T09:01:53.728613Z
Summary
Malicious code in lightmock (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (a3c7924362f935b55a808e1ede8ffea2dbc96326b853dc00d7ede36c002ff63c)

Clone of a legitimate package. During import, heavily obfuscate code downloads next stages and finally exfiltrates sensitive data, including data from web browsers.


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-03-lightmock

Reasons (based on the campaign):

  • clones-real-package

  • obfuscation

  • infostealer

  • exfiltration-browser-data

  • exfiltration-crypto

  • Downloads and executes a remote malicious script.

Database specific
{
    "iocs": {
        "domains": [
            "cookieshop.cloud"
        ]
    },
    "malicious-packages-origins": [
        {
            "sha256": "a3c7924362f935b55a808e1ede8ffea2dbc96326b853dc00d7ede36c002ff63c",
            "modified_time": "2026-03-26T08:27:10.21012Z",
            "source": "kam193",
            "id": "pypi/2026-03-lightmock/lightmock",
            "versions": [
                "0.1.0"
            ],
            "import_time": "2026-03-26T08:49:49.750027821Z"
        }
    ]
}
References
Credits

Affected packages

PyPI / lightmock

Package

Affected ranges

Affected versions

0.*
0.1.0

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/lightmock/MAL-2026-2233.json"