Cyber Security News

Threat Actors Deployed Hundreds of Python Packages to Steal System Data

In the open-source ecosystem, shadows shift as collaboration succeeds, attracting both novices and skilled threat actors. A rising threat has been evolving and sharpening its tools in recent months.

Checkmarx Supply Chain Security researchers have tracked a malicious actor since April, documenting their evolving tactics as they refine their skills.

Beginning in April 2023, an unidentified attacker pounded the Python environment with dozens of closely related malicious packages, generating 75,000 downloads and raising suspicions about a hidden objective.

Attacker Evolution (Source – Checkmarx)

The attacker’s initial packages appeared innocent, written in plain text, gradually infiltrating systems for their nefarious purposes.

Malicious Python Packages

Dependencies are installed silently, with the attacker employing subprocessing to avoid detection. The malware behaved like a vigilant predator, evading any signs of danger.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

All these would include:-

  • Virtual Environments
  • Specific users
  • Specific computer names
  • Specific hardware IDs
  • Specific IP addresses
  • Low-resource environments
  • Registry keys linked with VM software

Once in place, the malware initiated an expansive data theft operation, targeting:-

  • Browser Breach
  • Application Data Extraction
  • File Theft
  • Discord
  • Gaming Platforms
  • Screen Capturing

Further investigation unveiled the attacker’s focus on cryptocurrency. The malware monitored the clipboard, swapping legitimate addresses with its own to reroute funds. Consistent crypto addresses in multiple packages suggested a central strategy.

Attackers crypto addresses (Source – Checkmarx)

The attacker manipulated Exodus, a cryptocurrency wallet app, by modifying its core files, injecting their webhook URL, and evading the Content-Security-Policy for unrestricted data theft.

As spring turned to summer, the attacker’s tactics evolved with encrypted obfuscation, masking their actions while maintaining core functionality. The recent packages demonstrated a masterful layering of deception.

An elaborate network of obfuscation buried a secondary payload deep within the package, which, when decoded, unleashed a complicated, disguised harmful code.

Here below, we have mentioned all the capabilities:-

  • Functionality Galore
  • System Dominance
  • Hide and Delete
  • Screenshots Capture
  • Webcam Capture
  • Discord Data Mining
  • Extensive Machine Data Mining
  • Telegram Data Mining

The investigation of the attacker’s crypto wallet reveals six-figure transactions, demonstrating their success and the devastating impact of cyber attacks on individuals and organizations.

Persistent actors in open-source code now target GitHub, PyPi, and NPM, experimenting with and launching attacks actively.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

New ZAP PTK Add-On Maps Browser-Based Security Findings as Native Alert Into ZAP

The OWASP Zed Attack Proxy (ZAP) team has rolled out version 0.3.0 of the OWASP…

13 minutes ago

WhatsApp Warns Users Targeted by Spyware Attack via Weaponized Version of the App

Meta has officially alerted approximately 200 WhatsApp users, primarily located in Italy, that their devices…

35 minutes ago

Cisco Smart Software Manager Vulnerability Let Attackers Execute Arbitrary Commands

Cisco has issued an urgent security warning regarding a critical vulnerability in its Smart Software…

1 hour ago

Oracle Lays Off 30,000 Employees to Ramp Up Investment in AI Technologies

Oracle has executed a massive workforce reduction, eliminating between 20,000 and 30,000 employees globally to…

2 hours ago

Critical PX4 Autopilot Vulnerability Let Attackers Gain Control Over the Drones

A newly discovered critical vulnerability in the widely used PX4 Autopilot software could allow malicious…

2 hours ago

FBI Warns of Chinese Mobile Apps May Expose User Data to Cyberattacks

Millions of Americans use mobile apps daily without thinking much about where their data actually…

2 hours ago