MALICIOUS (1) campaign cataloged at 2025-10-22(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-10-asynhttp¶
Packages silently decrypt content hidden in a dependency and load them as Python extension modules.
In the first wave, those are copies of legitimate aiohttp and aiohappyeyeballs packages. In the second wave, malicious packages created good-looking forks of legitimate rich and pigments packages.
Abuse categories¶
clones_real_package
The package is a clone of a legitimate package or library, but with malicious code added.
exfiltration_generic
Campaign uses exfiltration_generic.
native-extension
Campaign uses native-extension.
obfuscation
Code uses obfuscation techniques to hide its true purpose.
typosquatting
The package name is an typosquatting variant of a popular package.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.