-= Per source details. Do not edit below this line.=-
During installation, package downloads downloads and executes next-stage script that then downloads a Sliver beacon and establishes persistence via a systemd service
Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.
Campaign: 2026-05-httpx-utils
Reasons (based on the campaign):
Downloads and executes a remote malicious script.
persistence
{
"iocs": {
"domains": [
"redir.acysec.site",
"acysec.site"
],
"urls": [
"https://redir.acysec.site/scripts/update.sh",
"https://api.github.com/repos/YoungKevinn/system-updater/releases/assets/409658341",
"https://gist.githubusercontent.com/YoungKevinn/96af9afbde472731f39a8a457b3e13db/raw/e9226aecb69eca0871b207a24d0b2ccaac4e2d13/update-manifest.txt"
]
},
"malicious-packages-origins": [
{
"id": "pypi/2026-05-httpx-utils/httpx-utils",
"sha256": "5d3d6ca7ec9867abcf3fb8a0170ca44801107a64fb1ff7f9aa437dd7b1f59845",
"modified_time": "2026-05-01T16:52:41.434235Z",
"versions": [
"1.0.2"
],
"import_time": "2026-05-01T17:26:31.557358156Z",
"source": "kam193"
}
]
}