diff --git a/osv/malicious/npm/amplitude-ma-ts/MAL-0000-amplitude-ma-ts.json b/osv/malicious/npm/amplitude-ma-ts/MAL-0000-amplitude-ma-ts.json new file mode 100644 index 00000000000..68c3848d8dc --- /dev/null +++ b/osv/malicious/npm/amplitude-ma-ts/MAL-0000-amplitude-ma-ts.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.7.3", + "published": "2026-04-24T05:40:43.069957427Z", + "modified": "2026-04-24T05:40:43.069957427Z", + "summary": "Malicious code in amplitude-ma-tspackage (npm)", + "details": "npm stealer. Hardcoded Discord webhook id 1497047226428690432 in postinstall Folder/bin/S.js. Exfils {hostname, whoami, pwd, public_ip (api.ipify.org), /etc/hosts} via Discord embed. v1.0.21 empty placeholder, v1.0.22 shipped payload — name-squat-then-poison. Typosquats @amplitude/* analytics scope. Maintainer 4senna (Gmail plus-alias throwaway). Score 20, signals: install_hook + nodejs_phone_home + iplookup_website + discord_bot + discord_exfil + exfil_whoami_hostname. Report: data/reports/research-threat-analysis/reports/2026-04-24-amplitude-ma-ts.md", + "affected": [ + { + "package": { + "name": "amplitude-ma-ts", + "ecosystem": "npm" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], + "references": [], + "credits": [ + { + "name": "SafeDep", + "contact": [ + "https://safedep.io" + ], + "type": "FINDER" + } + ] +}