<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent entries from ossf_malicious_packages</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent entries.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 11 Mar 2026 03:44:43 +0000</lastBuildDate>
    <item>
      <title>mal-2026-1315</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1315</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (2845ee24242fc511c6b3d7ad1fe8ed0ab3feb42f943edae6255d0a72f2b88460)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (2845ee24242fc511c6b3d7ad1fe8ed0ab3feb42f943edae6255d0a72f2b88460)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1315</guid>
    </item>
    <item>
      <title>mal-2026-1320</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1320</link>
      <description>Remote code execution via fetching code from a remote URL and Discord webhook usage indicates malicious intent. Single version adds to suspicion.</description>
      <content:encoded>Remote code execution via fetching code from a remote URL and Discord webhook usage indicates malicious intent. Single version adds to suspicion.</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1320</guid>
    </item>
    <item>
      <title>mal-2026-1319</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1319</link>
      <description>Package is malware due to ransomware-like behavior: file encryption, key exfiltration, terminal locking, ransom note, and persistence attempts.</description>
      <content:encoded>Package is malware due to ransomware-like behavior: file encryption, key exfiltration, terminal locking, ransom note, and persistence attempts.</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1319</guid>
    </item>
    <item>
      <title>mal-2026-1317</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1317</link>
      <description>Malware detected: Collects and exfiltrates sensitive data to a suspicious webhook via a preinstall script.</description>
      <content:encoded>Malware detected: Collects and exfiltrates sensitive data to a suspicious webhook via a preinstall script.</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1317</guid>
    </item>
    <item>
      <title>mal-2026-1318</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1318</link>
      <description>Package is malware. It exfiltrates data to a suspicious domain via callback.js, triggered by a preinstall script in package.json.</description>
      <content:encoded>Package is malware. It exfiltrates data to a suspicious domain via callback.js, triggered by a preinstall script in package.json.</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1318</guid>
    </item>
    <item>
      <title>mal-2026-1321</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1321</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (e4d79bdcbf291181336d3988ed7fd17314a787fb3c63ce81ea6af5412828a042)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (e4d79bdcbf291181336d3988ed7fd17314a787fb3c63ce81ea6af5412828a042)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1321</guid>
    </item>
    <item>
      <title>mal-2026-1322</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1322</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (f55edfe6ea35e734acb3592f0b13348ef997c46497c2975855d609ee45912671)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (f55edfe6ea35e734acb3592f0b13348ef997c46497c2975855d609ee45912671)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1322</guid>
    </item>
    <item>
      <title>mal-2026-1323</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1323</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (5fa1f9d14f84ac8f84bb9396f56e30ac62aedb0070d625f44091980b937c6ffe)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (5fa1f9d14f84ac8f84bb9396f56e30ac62aedb0070d625f44091980b937c6ffe)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1323</guid>
    </item>
    <item>
      <title>mal-2026-1324</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1324</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (375e0f06fa907cabddd21899e80ee07e0f33629ddbc5d73ee6be4a743b663791)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: ghsa-malware (375e0f06fa907cabddd21899e80ee07e0f33629ddbc5d73ee6be4a743b663791)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1324</guid>
    </item>
    <item>
      <title>mal-2026-1325</title>
      <link>https://db.gcve.eu/vuln/mal-2026-1325</link>
      <description>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (4ddf16f7a9941918ea74e21a3742e8f03d7b5c6f5720d7d031d2c69f8d6495c3)
Installing the package starts encrypting the user's file and demanding ransom for the decryption.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-03-synapseml-utils


Reasons (based on the campaign):


 - ransomware
</description>
      <content:encoded>
---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (4ddf16f7a9941918ea74e21a3742e8f03d7b5c6f5720d7d031d2c69f8d6495c3)
Installing the package starts encrypting the user's file and demanding ransom for the decryption.


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2026-03-synapseml-utils


Reasons (based on the campaign):


 - ransomware
</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/vuln/mal-2026-1325</guid>
    </item>
  </channel>
</rss>
