MALICIOUS (1) campaign cataloged at 2026-05-11(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-05-apkeep¶
The package pretends to be a fork of a legitimate Rust library and uses the identity of the original authors. During usage, the obfuscated code targets information held by Kanji/Iru security tools and exfiltrates basic informations to typosquated domain.
Abuse categories¶
action-hidden-in-lib-usage
The malicious action is hidden in the code and starts when user interacts with it (e.g. during class initialization or by exfiltrating given credentials).
basic_exfiltration
The package contains code to exfiltrate basic data from the system, like IP or username. It has a limited risk.
impersonation
Campaign uses impersonation.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
pureapk.co -
api.pureapk.co