VYPR

pypi · Malicious package advisory

Malware

alembic-util

MAL-2026-3700

Malicious code in alembic-util (PyPI)

Details


---
_-= Per source details. Do not edit below this line.=-_

## Source: kam193 (8e9b764ee0ccd6a2c6c2db1b7722f083ee9f643cb99d03821d5e6571f68db253)
During installation, package exfiltrates some basic info to a GitHub issue comment, and then attempt to set up a persistent infostealer focused on exfiltrating crypto wallets and browsers data. Likely continuation of 2026-05-py-requests


---

Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers.


Campaign: 2025-06-alembic-util


Reasons (based on the campaign):


 - infostealer


 - The package overrides the install command in setup.py to execute malicious code during installation.


 - crypto-related


 - Downloads and executes a remote malicious script.


 - exfiltration-browser-data


 - exfiltration-crypto


 - persistence


 - typosquatting

Compromised versions (1)

  • 0.189.33

Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.