MALICIOUS (1) campaign cataloged at 2026-04-27(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-04-compr-elementary-data¶
A threat actor exploited a vulnerability in the CI workflows to inject code and establish, likely, a reverse shell in the CI environment (https://github.com/elementary-data/elementary/actions/runs/24914128534/job/72962412074). Following that, the access was used to create 3 PRs with malicious code, and finally publish the malicious 0.23.3 version of the elementary-data package to PyPI, which was available between 2026-04-24 22:20 and 2026-04-25 9:45 (UTC) (https://github.com/elementary-data/elementary/actions/runs/24914446630). Malicious code was also published as a Docker image.
Malicious code was inserted in a PTH file, causing execution on any Python run. It then collects all kinds of sensitive data (credentials, .env files, cloud tokens, cryptocurrency wallets, Kubernetes configurations, shell history, data from AWS secret manager, ...) and exfiltrates to the hardcoded target.
Abuse categories¶
compromised-package
Campaign uses compromised-package.
exfiltration_cloud_tokens
Campaign uses exfiltration_cloud_tokens.
exfiltration_credentials
The package attempts to steal credentials, like passwords or API keys.
exfiltration_crypto
The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.
exfiltration_generic
Campaign uses exfiltration_generic.
exfiltration_ssh_keys
Campaign uses exfiltration_ssh_keys.
exploited-ci-vulnerability
Campaign uses exploited-ci-vulnerability.
files_exfiltration
Campaign uses files_exfiltration.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
-
https://github.com/elementary-data/elementary/actions/runs/24914128534/job/72962412074
-
https://github.com/elementary-data/elementary/pull/2204/changes
-
https://github.com/elementary-data/elementary/pull/2203/changes
-
https://github.com/elementary-data/elementary/actions/runs/24914446630
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://litter.catbox.moe/iqesmbhukgd2c7hq.sh -
igotnofriendsonlineorirl-imgonnakmslmao.skyhanni.cloud