MALICIOUS (1) campaign cataloged at 2026-05-01(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2026-05-httpx-utils¶
During installation, package downloads downloads and executes next-stage script that then downloads a Sliver beacon and establishes persistence via a systemd service
Abuse categories¶
persistence
Campaign uses persistence.
remote_script
Downloads and executes a remote malicious script.
References¶
Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://redir.acysec.site/scripts/update.sh -
redir.acysec.site -
acysec.site -
hxxps://api.github.com/repos/YoungKevinn/system-updater/releases/assets/409658341 -
hxxps://gist.githubusercontent.com/YoungKevinn/96af9afbde472731f39a8a457b3e13db/raw/e9226aecb69eca0871b207a24d0b2ccaac4e2d13/update-manifest.txt