mal-2025-192376
Vulnerability from ossf_malicious_packages
Published
2025-12-08 14:14
Modified
2025-12-08 14:14
Summary
Malicious code in graphnode (PyPI)
Details
-= Per source details. Do not edit below this line.=-
Source: kam193 (981903800087e4528bba3ec6bb841e810feaedfa490e7f078fcac9c9d663e4ce)
This is a malicious copy of the networkx package. It contains an obfuscated script that downloads and runs further scripts from one of multiple locations, and perform covering tracks by removing the modified code and all references to it. During the analysis, most of remote URLs did not serve any meaningful content, so the final goal is unknown.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2025-12-graphnode
Reasons (based on the campaign):
-
obfuscation
-
Downloads and executes a remote malicious script.
-
clones-real-package
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "graphnode"
},
"versions": [
"1.1.0",
"1.0.1",
"1.0.0"
]
}
],
"credits": [
{
"contact": [
"https://github.com/kam193",
"https://bad-packages.kam193.eu/"
],
"name": "Kamil Ma\u0144kowski (kam193)",
"type": "REPORTER"
}
],
"database_specific": {
"iocs": {
"domains": [
"aurevian.cloud"
],
"urls": [
"https://raw.githubusercontent.com/oscaratkins831/CrowdFunding-Smart-Contract-main/refs/heads/main/readme.md",
"https://drive.google.com/uc?export=download\u0026id=1JhtoVi6UjdCEa9mT5kHvYxd2UauiccW4",
"https://aurevian.cloud/public/startup.py?ver=1.2",
"https://raw.githubusercontent.com/ronniebrooks/node-javascript-ecommerce-main/refs/heads/main/.gitignore",
"https://raw.githubusercontent.com/ronniebrooks/node-javascript-ecommerce-main/refs/heads/main/package.json",
"https://drive.google.com/uc?export=download\u0026id=1FKQxvZM2zl0pmtf_cIHdjLSVdf-ZlUYR",
"https://drive.google.com/uc?export=download\u0026id=1RPC49CCI9urhfoVdPkO3pCSI4Lr430Lx"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2025-12-graphnode/graphnode",
"import_time": "2025-12-08T14:40:59.544838707Z",
"modified_time": "2025-12-08T14:14:35.968318Z",
"sha256": "981903800087e4528bba3ec6bb841e810feaedfa490e7f078fcac9c9d663e4ce",
"source": "kam193",
"versions": [
"1.1.0",
"1.0.1",
"1.0.0"
]
}
]
},
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (981903800087e4528bba3ec6bb841e810feaedfa490e7f078fcac9c9d663e4ce)\nThis is a malicious copy of the networkx package. It contains an obfuscated script that downloads and runs further scripts from one of multiple locations, and perform covering tracks by removing the modified code and all references to it. During the analysis, most of remote URLs did not serve any meaningful content, so the final goal is unknown.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2025-12-graphnode\n\n\nReasons (based on the campaign):\n\n\n - obfuscation\n\n\n - Downloads and executes a remote malicious script.\n\n\n - clones-real-package\n",
"id": "MAL-2025-192376",
"modified": "2025-12-08T14:14:35Z",
"published": "2025-12-08T14:14:35Z",
"references": [
{
"type": "WEB",
"url": "https://bad-packages.kam193.eu/pypi/package/graphnode"
}
],
"schema_version": "1.7.4",
"summary": "Malicious code in graphnode (PyPI)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…