mal-2024-8842
Vulnerability from ossf_malicious_packages
Malicious code in call-blockflow (npm)
The package contains a preinstall hook which silently executes a malicious script with downloader functionality. This is characteristic of an ongoing North Korean state-sponsored campaign.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "call-blockflow" }, "versions": [ "1.0.0" ] } ], "credits": [ { "contact": [ "https://discord.com/invite/RkzVuTp3WK" ], "name": "Stacklok: trustypkg.dev", "type": "FINDER" } ], "database_specific": { "malicious-packages-origins": null }, "details": "The package contains a preinstall hook which silently executes a malicious script with downloader functionality. This is characteristic of an ongoing North Korean state-sponsored campaign.", "id": "MAL-2024-8842", "modified": "2024-09-05T09:15:00Z", "published": "2024-09-05T09:39:45Z", "schema_version": "1.5.0", "summary": "Malicious code in call-blockflow (npm)" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.