pypi · Malicious package advisory
Malwareasync-http-tools
MAL-2026-3702
Malicious code in async-http-tools (PyPI)
Details
--- _-= Per source details. Do not edit below this line.=-_ ## Source: kam193 (85e8a68bad6595a817f1dabed757662e2a04cfec7b45a86d9bfd61a7a78d14d1) During installation, package exfiltrates some basic info to a GitHub issue comment, and then attempt to set up a persistent infostealer focused on exfiltrating crypto wallets and browsers data. Likely continuation of 2026-05-py-requests --- Category: MALICIOUS - The campaign has clearly malicious intent, like infostealers. Campaign: 2025-06-alembic-util Reasons (based on the campaign): - infostealer - The package overrides the install command in setup.py to execute malicious code during installation. - crypto-related - Downloads and executes a remote malicious script. - exfiltration-browser-data - exfiltration-crypto - persistence - typosquatting
Compromised versions (1)
- 0.70.125
Any computer that installed or ran a compromised version should be considered fully compromised. Rotate every secret on that machine from a clean environment.