mal-2026-3083
Vulnerability from ossf_malicious_packages
-= Per source details. Do not edit below this line.=-
Source: kam193 (96dc65f67f54411d3de6b23a33a8f73665e2703d7261b7f1720cdc089c528eea)
Versions 0.23.3 were compromised.
A threat actor exploited a vulnerability in the CI workflows to inject code and establish, likely, a reverse shell in the CI environment (https://github.com/elementary-data/elementary/actions/runs/24914128534/job/72962412074). Following that, the access was used to create 3 PRs with malicious code, and finally publish the malicious 0.23.3 version of the elementary-data package to PyPI, which was available between 2026-04-24 22:20 and 2026-04-25 9:45 (UTC) (https://github.com/elementary-data/elementary/actions/runs/24914446630). Malicious code was also published as a Docker image.
Malicious code was inserted in a PTH file, causing execution on any Python run. It then collects all kinds of sensitive data (credentials, .env files, cloud tokens, cryptocurrency wallets, Kubernetes configurations, shell history, data from AWS secret manager, ...) and exfiltrates to the hardcoded target.
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-04-compr-elementary-data
Reasons (based on the campaign):
-
files-exfiltration
-
exfiltration-generic
-
exfiltration-ssh-keys
-
obfuscation
-
exfiltration-cloud-tokens
-
exfiltration-crypto
-
exfiltration-credentials
-
compromised-package
-
exploited-ci-vulnerability
Source: ossf-package-analysis (83f9b178b520d3ad8b49bc9ea2b454eacf64fc302ec42aff6f90a1245af299e9)
The OpenSSF Package Analysis project identified 'elementary-data' @ 0.23.3 (pypi) as malicious.
It is considered malicious because:
- The package executes one or more commands associated with malicious behavior.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "elementary-data"
},
"versions": [
"0.23.3"
]
}
],
"credits": [
{
"contact": [
"https://github.com/kam193",
"https://bad-packages.kam193.eu/"
],
"name": "Kamil Ma\u0144kowski (kam193)",
"type": "ANALYST"
},
{
"contact": [
"https://github.com/ossf/package-analysis",
"https://openssf.slack.com/channels/package_analysis"
],
"name": "OpenSSF: Package Analysis",
"type": "FINDER"
}
],
"database_specific": {
"iocs": {
"domains": [
"igotnofriendsonlineorirl-imgonnakmslmao.skyhanni.cloud"
],
"urls": [
"https://litter.catbox.moe/iqesmbhukgd2c7hq.sh"
]
},
"malicious-packages-origins": [
{
"import_time": "2026-04-27T01:40:39.824783003Z",
"modified_time": "2026-04-24T22:54:25Z",
"sha256": "83f9b178b520d3ad8b49bc9ea2b454eacf64fc302ec42aff6f90a1245af299e9",
"source": "ossf-package-analysis",
"versions": [
"0.23.3"
]
},
{
"id": "pypi/2026-04-compr-elementary-data/elementary-data",
"import_time": "2026-04-27T10:18:08.146234082Z",
"modified_time": "2026-04-27T09:33:07Z",
"sha256": "96dc65f67f54411d3de6b23a33a8f73665e2703d7261b7f1720cdc089c528eea",
"source": "kam193",
"versions": [
"0.23.3"
]
},
{
"id": "pypi/2026-04-compr-elementary-data/elementary-data",
"import_time": "2026-04-27T12:05:07.441280295Z",
"modified_time": "2026-04-27T09:33:07Z",
"sha256": "fcb538f8a937dd2e97532899be80827772aa99f0523c582aef301682d6e96b75",
"source": "kam193",
"versions": [
"0.23.3"
]
},
{
"id": "pypi/2026-04-compr-elementary-data/elementary-data",
"import_time": "2026-04-27T14:17:06.155740851Z",
"modified_time": "2026-04-27T09:33:07Z",
"sha256": "cc802c0d8b918c99b39f26f473e8090b7073d45268b399df2e2ff5d5549c2a37",
"source": "kam193",
"versions": [
"0.23.3"
]
}
]
},
"details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (96dc65f67f54411d3de6b23a33a8f73665e2703d7261b7f1720cdc089c528eea)\nVersions 0.23.3 were compromised.\n\n\nA threat actor exploited a vulnerability in the CI workflows to inject code and establish, likely, a reverse shell in the CI environment (https://github.com/elementary-data/elementary/actions/runs/24914128534/job/72962412074). Following that, the access was used to create 3 PRs with malicious code, and finally publish the malicious 0.23.3 version of the elementary-data package to PyPI, which was available between 2026-04-24 22:20 and 2026-04-25 9:45 (UTC) (https://github.com/elementary-data/elementary/actions/runs/24914446630). Malicious code was also published as a Docker image.\n\nMalicious code was inserted in a PTH file, causing execution on any Python run. It then collects all kinds of sensitive data (credentials, .env files, cloud tokens, cryptocurrency wallets, Kubernetes configurations, shell history, data from AWS secret manager, ...) and exfiltrates to the hardcoded target.\n\n\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2026-04-compr-elementary-data\n\n\nReasons (based on the campaign):\n\n\n - files-exfiltration\n\n\n - exfiltration-generic\n\n\n - exfiltration-ssh-keys\n\n\n - obfuscation\n\n\n - exfiltration-cloud-tokens\n\n\n - exfiltration-crypto\n\n\n - exfiltration-credentials\n\n\n - compromised-package\n\n\n - exploited-ci-vulnerability\n\n## Source: ossf-package-analysis (83f9b178b520d3ad8b49bc9ea2b454eacf64fc302ec42aff6f90a1245af299e9)\nThe OpenSSF Package Analysis project identified \u0027elementary-data\u0027 @ 0.23.3 (pypi) as malicious.\n\nIt is considered malicious because:\n\n- The package executes one or more commands associated with malicious behavior.\n",
"id": "MAL-2026-3083",
"modified": "2026-04-27T14:18:51Z",
"published": "2026-04-24T22:54:25Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/elementary-data/elementary/issues/2205"
},
{
"type": "WEB",
"url": "https://github.com/realtungtungtungsahur"
},
{
"type": "WEB",
"url": "https://github.com/elementary-data/elementary/actions/runs/24914128534/job/72962412074"
},
{
"type": "WEB",
"url": "https://github.com/elementary-data/elementary/pull/2204/changes"
},
{
"type": "WEB",
"url": "https://github.com/elementary-data/elementary/pull/2203/changes"
},
{
"type": "WEB",
"url": "https://github.com/elementary-data/elementary/pull/2203"
},
{
"type": "WEB",
"url": "https://github.com/elementary-data/elementary/actions/runs/24914446630"
},
{
"type": "WEB",
"url": "https://bad-packages.kam193.eu/pypi/campaign/2026-04-compr-elementary-data"
},
{
"type": "WEB",
"url": "https://www.stepsecurity.io/blog/elementary-data-compromised-on-pypi-and-ghcr-forged-release-pushed-via-github-actions-script-injection"
},
{
"type": "WEB",
"url": "https://www.elementary-data.com/post/security-incident-report-malicious-release-of-elementary-oss-python-cli-v0-23-3"
}
],
"schema_version": "1.7.4",
"summary": "Malicious code in elementary-data (PyPI)"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.