• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Hackers bombard PyPi platform with information-stealing malware

Bill Toulas by Bill Toulas
December 20, 2022
Reading Time: 3 mins read
0
Aurora infostealer malware increasingly adopted by cybergangs

Hand stealing data through a computer

RELATED POSTS

Clop ransomware claims responsibility for MOVEit extortion attacks

Microsoft’s Outlook.com is down again on mobile, web

New tool scans iPhones for ‘Triangulation’ malware infection

The PyPi python package repository is being bombarded by a wave of information-stealing malware hiding inside malicious packages uploaded to the platform to steal software developers’ data.

The malware dropped in this campaign is a clone of the open-source W4SP Stealer, responsible for a previous widespread malware infection on PyPI in November 2022.

Since then, an additional 31 packages dropping ‘W4SP’ have been removed from the PyPI repository, with the malware’s operators continuing to seek new ways to reintroduce their malware on the platform.

Targeting open-source developers

Last week, the Phylum research team reported it had found another set of 47 packages that distributed W4SP on PyPI. However, this operation was disrupted after GitHub terminated the repository used by the threat actor for fetching the primary payload.

The cybersecurity firm reported yesterday that at least 16 packages on PyPI are spreading ten different information-stealing malware variants based on W4SP Stealer.

The malicious packages that contain these information stealers are:

Buy JNews
ADVERTISEMENT
  • modulesecurity – 114 downloads
  • informmodule – 110 downloads
  • chazz – 118 downloads
  • randomtime – 118 downloads
  • proxygeneratorbil – 91 downloads
  • easycordey – 122 downloads
  • easycordeyy – 103 downloads
  • tomproxies – 150 downloads
  • sys-ej – 186 downloads
  • py4sync – 453 downloads
  • infosys – 191 downloads
  • sysuptoer – 186 downloads
  • nowsys – 202 downloads
  • upamonkws – 205 downloads
  • captchaboy – 123 downloads
  • proxybooster – 69 downloads

While these packages drop stealers that use different names, like Celestial Stealer, ANGEL stealer, Satan Stealer, @skid Stealer, and Leaf $tealer, Phylum has found that they are all based on the W4SP code.

“Each deployment appears to have simply tried to do a find/replace of the W4SP references in exchange for some other seemingly arbitrary name. In some cases, not all references were removed and trace strings of “W4SP” remain.” – Phylum.

With one exception, “chazz,” the new stealers do not follow W4SP’s complex attack chain that features multiple stages and code obfuscation.

Instead, they drop the stealer’s code directly into the “main.py” or the “_init_.py” files with no encoding, so a basic code review immediately reveals their nature.

Informmodule _init_.py code
Informmodule ‘_init_.py’ code (Phylum)

The “chazz” package, which drops a copy of the “Leaf $tealer,” is the only one of the new batch that features some obfuscation via the BlankOBF tool, but it’s still reasonably easy to deobfuscat

Following the same tactics as with the W4SP operation, the new stealers use GitHub repositories as a remote resource for downloading the malware payload.

The GitHub repository of Satan Stealer
The GitHub repository of Satan Stealer (Phylum)

It is unclear whether these malware “clones” are operated by the same threat actors behind W4SP or its copycats, but Phylum hypothesizes it’s from different groups that attempt to mimic previous campaigns.

All the packages presented in this report have been removed from the PyPI repository, but not before they were downloaded over 2,500 times.

Hackers have been increasingly targeting open-source package repositories as compromising developer’s systems offers an opportunity for even larger attacks.

As developers commonly store authorization tokens and API keys in their applications, stealing these secrets could allow threat actors to conduct more widespread supply chain attacks or steal data for use in extortion demands.

As long as the infection numbers make an effort worthwhile, we will continue to see threat actors uploading malicious packages on open-source repositories under different names and accounts.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Hackers exploit Control Web Panel flaw to open reverse shells
Cyber Security

Clop ransomware claims responsibility for MOVEit extortion attacks

June 5, 2023
Outlook for Mac now free, Microsoft 365 subscription not needed
Cyber Security

Microsoft’s Outlook.com is down again on mobile, web

June 5, 2023
New tool scans iPhones for ‘Triangulation’ malware infection
Cyber Security

New tool scans iPhones for ‘Triangulation’ malware infection

June 5, 2023
New AhRat Android malware hidden in app with 50,000 installs
Cyber Security

SpinOk Android malware found in more apps with 30 million installs

June 5, 2023
GIGABYTE releases new firmware to fix recently disclosed security flaws
Cyber Security

GIGABYTE releases new firmware to fix recently disclosed security flaws

June 5, 2023
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
Cyber Security

KeePass v2.54 fixes bug that leaked cleartext master password

June 5, 2023

Recommended Stories

Why AVAX’s prospects look bleak despite a surge in addresses

Why AVAX’s prospects look bleak despite a surge in addresses

May 31, 2023
Bitcoin [BTC] to slide under $20k soon? These metrics suggest…

Bitcoin [BTC] to slide under $20k soon? These metrics suggest…

March 17, 2023
Smooth Love Potion [SLP] Price Prediction: Can the altcoin reverse early Q2 losses?

Smooth Love Potion [SLP] Price Prediction: Can the altcoin reverse early Q2 losses?

May 16, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Uniswap: What’s next as UNI’s plunge hits range low
  • Polygon zkEVM’s growth unhindered: What it means for MATIC
  • Polkadot announces new proposal; will DOT see a change of fate

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?