<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/rss/recent/ossf_malicious_packages/10</id>
  <title>Most recent entries from ossf_malicious_packages</title>
  <updated>2026-03-13T05:35:28.267491+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent entries.</subtitle>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1368</id>
    <title>mal-2026-1368</title>
    <updated>2026-03-13T05:35:28.271533+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (18627c1c0def6faaa8722de5bc97f27981110eaf8844500039b842de043d2f62)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1368"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (18627c1c0def6faaa8722de5bc97f27981110eaf8844500039b842de043d2f62)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1376</id>
    <title>mal-2026-1376</title>
    <updated>2026-03-13T05:35:28.271526+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (a2438dea0d9c11785c29b36ff7920dbfd9412490895daef75183203268e86947)
The OpenSSF Package Analysis project identified '@appleseed-apple/ac-sasskit' @ 99.9.9 (npm) as malicious.

It is considered malicious because:

- The package executes one or more commands associated with malicious behavior.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1376"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (a2438dea0d9c11785c29b36ff7920dbfd9412490895daef75183203268e86947)
The OpenSSF Package Analysis project identified '@appleseed-apple/ac-sasskit' @ 99.9.9 (npm) as malicious.

It is considered malicious because:

- The package executes one or more commands associated with malicious behavior.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1375</id>
    <title>mal-2026-1375</title>
    <updated>2026-03-13T05:35:28.271518+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (3af90fe9425ea0b697bf1e9400d9733a99f5bd46cf578b368dcd7859435775a1)
The OpenSSF Package Analysis project identified '@adamallana0909/apple-research-test' @ 99.9.46 (npm) as malicious.

It is considered malicious because:

- The package executes one or more commands associated with malicious behavior.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1375"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (3af90fe9425ea0b697bf1e9400d9733a99f5bd46cf578b368dcd7859435775a1)
The OpenSSF Package Analysis project identified '@adamallana0909/apple-research-test' @ 99.9.46 (npm) as malicious.

It is considered malicious because:

- The package executes one or more commands associated with malicious behavior.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1371</id>
    <title>mal-2026-1371</title>
    <updated>2026-03-13T05:35:28.271511+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (c17c6bb947662d942c27cdf7ca9572536ea97f7864070648eb417277cad2e71e)
Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2025-11-spellcheckers


Reasons (based on the campaign):


 - obfuscation


 - Downloads and executes a remote malicious script.


 - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1371"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (c17c6bb947662d942c27cdf7ca9572536ea97f7864070648eb417277cad2e71e)
Packages contain hidden code that is effectively run during importing or using the library, and downloads second stage code. Then, a process running in background periodically connects to a remote host and waits for next code to execute


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2025-11-spellcheckers


Reasons (based on the campaign):


 - obfuscation


 - Downloads and executes a remote malicious script.


 - The package contains code to execute remote commands (probably limited to a specific set) on the victim's machine.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1372</id>
    <title>mal-2026-1372</title>
    <updated>2026-03-13T05:35:28.271503+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (0cf0cf2bc36657d38deacc7503daba2ba64c2f7d74af3da21d4bfb7c3a0f24c4)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1372"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (0cf0cf2bc36657d38deacc7503daba2ba64c2f7d74af3da21d4bfb7c3a0f24c4)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1373</id>
    <title>mal-2026-1373</title>
    <updated>2026-03-13T05:35:28.271495+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (71ddfc12997981cb7223086a773ca7ca9dee0c1e20de0bd2ee59cb4846f9edef)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1373"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (71ddfc12997981cb7223086a773ca7ca9dee0c1e20de0bd2ee59cb4846f9edef)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1374</id>
    <title>mal-2026-1374</title>
    <updated>2026-03-13T05:35:28.271487+00:00</updated>
    <content>Malicious package detected. Suspicious preinstall script exfiltrates data to a remote server. Multiple YARA rules and LLM analysis confirm.</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1374"/>
    <summary>Malicious package detected. Suspicious preinstall script exfiltrates data to a remote server. Multiple YARA rules and LLM analysis confirm.</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1377</id>
    <title>mal-2026-1377</title>
    <updated>2026-03-13T05:35:28.271479+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (8d1bc04d7f0ba0ec2ebe038c4cb910c2760bb00aa4f7576723f7b71d5577788e)
The OpenSSF Package Analysis project identified 'adroit-websdk-server' @ 99.99.9 (npm) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.

- The package executes one or more commands associated with malicious behavior.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1377"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (8d1bc04d7f0ba0ec2ebe038c4cb910c2760bb00aa4f7576723f7b71d5577788e)
The OpenSSF Package Analysis project identified 'adroit-websdk-server' @ 99.99.9 (npm) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.

- The package executes one or more commands associated with malicious behavior.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1378</id>
    <title>mal-2026-1378</title>
    <updated>2026-03-13T05:35:28.271468+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (82711e67b42ab2afe01272581cd97b09b9550693962fe130b381113b5d6f3e03)
The OpenSSF Package Analysis project identified 'f0-service-address-doctor' @ 99.99.9 (npm) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.

- The package executes one or more commands associated with malicious behavior.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1378"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ossf-package-analysis (82711e67b42ab2afe01272581cd97b09b9550693962fe130b381113b5d6f3e03)
The OpenSSF Package Analysis project identified 'f0-service-address-doctor' @ 99.99.9 (npm) as malicious.

It is considered malicious because:

- The package communicates with a domain associated with malicious activity.

- The package executes one or more commands associated with malicious behavior.
</summary>
  </entry>
  <entry>
    <id>https://db.gcve.eu/vuln/mal-2026-1379</id>
    <title>mal-2026-1379</title>
    <updated>2026-03-13T05:35:28.271438+00:00</updated>
    <content>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (8653dd8d9372dda6122b5ac738ed053d7750f453b48598cc35396b3044afa348)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content>
    <link href="https://db.gcve.eu/vuln/mal-2026-1379"/>
    <summary>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (8653dd8d9372dda6122b5ac738ed053d7750f453b48598cc35396b3044afa348)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</summary>
  </entry>
</feed>
