MAL-2026-3216

See a problem?
Import Source
https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/httpx-utils/MAL-2026-3216.json
JSON Data
https://api.osv.dev/v1/vulns/MAL-2026-3216
Published
2026-05-01T16:52:41Z
Modified
2026-05-01T17:31:59.015660Z
Summary
Malicious code in httpx-utils (PyPI)
Details

-= Per source details. Do not edit below this line.=-

Source: kam193 (5d3d6ca7ec9867abcf3fb8a0170ca44801107a64fb1ff7f9aa437dd7b1f59845)

During installation, package downloads downloads and executes next-stage script that then downloads a Sliver beacon and establishes persistence via a systemd service


Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.

Campaign: 2026-05-httpx-utils

Reasons (based on the campaign):

  • Downloads and executes a remote malicious script.

  • persistence

Database specific
{
    "iocs": {
        "domains": [
            "redir.acysec.site",
            "acysec.site"
        ],
        "urls": [
            "https://redir.acysec.site/scripts/update.sh",
            "https://api.github.com/repos/YoungKevinn/system-updater/releases/assets/409658341",
            "https://gist.githubusercontent.com/YoungKevinn/96af9afbde472731f39a8a457b3e13db/raw/e9226aecb69eca0871b207a24d0b2ccaac4e2d13/update-manifest.txt"
        ]
    },
    "malicious-packages-origins": [
        {
            "id": "pypi/2026-05-httpx-utils/httpx-utils",
            "sha256": "5d3d6ca7ec9867abcf3fb8a0170ca44801107a64fb1ff7f9aa437dd7b1f59845",
            "modified_time": "2026-05-01T16:52:41.434235Z",
            "versions": [
                "1.0.2"
            ],
            "import_time": "2026-05-01T17:26:31.557358156Z",
            "source": "kam193"
        }
    ]
}
References
Credits

Affected packages

PyPI / httpx-utils

Package

Affected ranges

Affected versions

1.*
1.0.2

Database specific

source
"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/httpx-utils/MAL-2026-3216.json"