{"id":"MAL-2024-5721","summary":"Malicious code in pyhttpproxifier (PyPI)","details":"\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: kam193 (39705bbe10a91b3e2c4279406418971389f07807bb4544b10fb9710bdc0fb0ef)\n---\n\nCategory: MALICIOUS - The campaign has clearly malicious intent, like infostealers.\n\n\nCampaign: 2023-11-update-information-endpoint\n\n\nReasons (based on the campaign):\n\n\n - obfuscation\n\n\n - The package overrides the install command in setup.py to execute malicious code during installation.\n\n\n - typosquatting\n","aliases":["SNYK-PYTHON-PYHTTPPROXIFIER-6139263"],"modified":"2026-03-19T13:04:18.056506Z","published":"2024-06-25T13:40:09Z","database_specific":{"malicious-packages-origins":[{"id":"RLMA-2024-04507","versions":["0.9.3","0.9.2"],"sha256":"ea9afb1ee122cb2d9ac43a293fbf3fea7c76bab4ec771a45d718d9f5f5176ecb","import_time":"2024-06-28T02:50:08.455059843Z","modified_time":"2024-06-25T13:40:09Z","source":"reversing-labs"},{"id":"RLUA-2024-08945","sha256":"dc55c4f27862e384c8f466b8b3ea8a784dd2afb75916767c22f811fe8f7f2163","import_time":"2024-10-24T00:59:52.167946248Z","modified_time":"2024-10-16T14:48:06Z","source":"reversing-labs"},{"id":"pypi/2023-11-update-information-endpoint/pyhttpproxifier","sha256":"39d1db7e77e25ff58111cef492a839286cbc3635cd7e50794cf218db3b111286","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"import_time":"2025-12-02T22:30:55.469003578Z","modified_time":"2024-08-09T19:17:59Z","source":"kam193"},{"id":"pypi/2023-11-update-information-endpoint/pyhttpproxifier","sha256":"39705bbe10a91b3e2c4279406418971389f07807bb4544b10fb9710bdc0fb0ef","ranges":[{"events":[{"introduced":"0"}],"type":"ECOSYSTEM"}],"import_time":"2025-12-02T23:07:18.493746593Z","modified_time":"2024-08-09T19:17:59Z","source":"kam193"},{"id":"pypi/2023-11-update-information-endpoint/pyhttpproxifier","versions":["0.9.3","0.9.2"],"sha256":"770fa96aa12f920d2c69a15706cf9b92c331e26693d4bf5c0f13f6d90b0cbda3","import_time":"2025-12-10T21:38:57.707844753Z","modified_time":"2024-08-09T19:17:59Z","source":"kam193"},{"id":"RLUA-2025-06581","sha256":"0c444844511c3332bbb9825a35cddb5b98af27df75ac5c8185a5597df5fbb75b","import_time":"2025-12-24T10:07:36.689475746Z","modified_time":"2025-12-23T08:39:26Z","source":"reversing-labs"},{"id":"pypi/2023-11-update-information-endpoint/pyhttpproxifier","versions":["0.9.2","0.9.3"],"sha256":"2395573889c3ebd57f5d26ad2da7316a45eccd28bb073635c7bb20c4fbb3a998","import_time":"2025-12-30T22:39:04.144638818Z","modified_time":"2024-08-09T19:17:59Z","source":"kam193"},{"id":"RLUA-2026-00635","sha256":"41f0c376c0598bcf3c029927c85034bc9cbbe2f0e028554964d940b4b18d4269","import_time":"2026-03-19T12:20:15.803866178Z","modified_time":"2026-03-18T12:17:29Z","source":"reversing-labs"}]},"references":[{"type":"ARTICLE","url":"https://medium.com/checkmarx-security/python-packages-leverage-github-to-deploy-fileless-malware-b6c281dea58f"},{"type":"ADVISORY","url":"https://security.snyk.io/vuln/SNYK-PYTHON-PYHTTPPROXIFIER-6139263"},{"type":"WEB","url":"https://bad-packages.kam193.eu/pypi/package/pyhttpproxifier"},{"type":"ARTICLE","url":"https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise"}],"affected":[{"package":{"name":"pyhttpproxifier","ecosystem":"PyPI","purl":"pkg:pypi/pyhttpproxifier"},"versions":["0.9.3","0.9.2"],"database_specific":{"source":"https://github.com/ossf/malicious-packages/blob/main/osv/malicious/pypi/pyhttpproxifier/MAL-2024-5721.json"}}],"schema_version":"1.7.5","credits":[{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"]},{"name":"Kamil Mańkowski (kam193)","contact":["https://github.com/kam193","https://bad-packages.kam193.eu/"],"type":"ANALYST"},{"name":"ReversingLabs","contact":["https://www.reversinglabs.com"],"type":"FINDER"}]}