Cybercriminals Abuse StackOverflow to Promote Malicious Python Package

Cyber Security

Products You May Like

May 29, 2024NewsroomSoftware Security / Supply Chain

Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI) repository to facilitate cryptocurrency theft as part of a broader campaign.

The package in question is pytoileur, which has been downloaded 316 times as of writing. Interestingly, the package author, who goes by the name PhilipsPY, has uploaded a new version of the package (1.0.2) with identical functionality after a previous version (1.0.1) was yanked by PyPI maintainers on May 28, 2024.

According to an analysis released by Sonatype, the malicious code is embedded in the package’s setup.py script, allowing it to execute a Base64-encoded payload that’s responsible for retrieving a Windows binary from an external server.

Cybersecurity

“The retrieved binary, ‘Runtime.exe,’ is then run by leveraging Windows PowerShell and VBScript commands on the system,” security researcher Ax Sharma said.

Once installed, the binary establishes persistence and drops additional payloads, including spyware and a stealer malware capable of gathering data from web browsers and cryptocurrency services.

Sonatype said it also identified a newly created StackOverflow account called “EstAYA G” responding to users’ queries on the question-and-answer platform, directing them to install the rogue pytoileur package as a supposed solution to their issues.

“While definitive attribution is challenging when assessing pseudonymous user accounts on internet platforms without access to logs, the recent age of both of these user accounts and their sole purpose of publishing and promoting the malicious Python package gives us a good indication that these are linked to the same threat actor(s) behind this campaign,” Sharma told The Hacker News.

The development marks a new escalation in that it abuses a credible platform as a propagation vector for malware.

“The unprecedented open abuse of such a credible platform, using it as a breeding ground for malicious campaigns, is a huge warning sign for developers globally,” Sonatype further said in a statement shared with The Hacker News.

Cybersecurity

“StackOverflow’s compromise is especially concerning given the large number of novice developers it has, who are still learning, asking questions, and may fall for malicious advice.”

A closer examination of the package metadata and its authorship history has revealed overlaps with a prior campaign involving bogus Python packages such as Pystob and Pywool, which was disclosed by Checkmarx in November 2023.

The findings are another example of why open-source ecosystems continue to be a magnet for threat actors looking to compromise several targets all at once with information stealers like Bladeroid and other malware by means of what’s called a supply chain attack.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Products You May Like

Articles You May Like

Microsoft’s Surface Pro is fine, but it isn’t the AI device to change personal computing
Meta Charged by EU for Breaching Tech Rules With Its Pay or Consent Advertising Model
Meta Shares Study on Meta 3D Gen, a Generative AI System to Create 3D Assets From Text Prompts
Revolut CEO confident on UK bank license approval as fintech firm hits record $545 million profit
Google Pixel Smartphones Manufactured in India to be Exported to Europe, US: Report

Leave a Reply

Your email address will not be published. Required fields are marked *