Attackers can get root by crashing Ubuntu’s AccountsService
Attackers can get root by crashing Ubuntu’s AccountsService
Police arrests ransomware affiliate behind high-profile attacks
Bugs in billions of WiFi, Bluetooth chips allow password, data theft
Google pushes emergency Chrome update to fix zero-day used in attacks
TinyNuke info-stealing malware is again attacking French users
Phishing campaign uses PowerPoint macros to drop Agent Tesla
Dell driver fix still allows Windows Kernel-level attacks
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
The Python Package Index (PyPI) registry has removed three malicious Python packages aimed at exfiltrating environment variables and dropping trojans on the infected machines.
These malicious packages are estimated to have generated over 10,000 downloads and mirrors put together, according to the researchers’ report.
This week, Andrew Scott, a developer and senior product manager at Palo Alto Networks, reported discovering three malicious Python packages on the PyPI open source registry.
These malicious packages, shown below, have altogether been downloaded and mirrored almost 15,000 times.
The first version of dpp-client surfaced on PyPI around February 13th, 2021, and the one for dpp-client1234 on the 14th. Whereas, the first version of aws-login0tool appeared more recently, on December 1st.
*Download counts aggregated from PyPIstats and may include (automated) mirrors, in addition to organic downloads by developers.
While performing large-scale static analysis of “a large percentage of the packages on PyPI,” Scott came across these mysterious-looking packages.
“I caught these primarily through manual inspection of files that matched various suspicion strings and regex patterns I was looking for,” Scott tells BleepingComputer in an email interview.
“For example, most cases of exec were benign, but it’s a risky method to use, and commonly leveraged by attackers crafting malicious packages.”
To aid in his research, Scott made use of the Python Packaging Authority’s Bandersnatch open source project.
“Once I had a large number of the package distributions downloaded, I needed to extract them for easier analysis. I put together a pretty simple Python script to recursively iterate through Bandersnatch’s somewhat complicated folder structure then decompressed and extracted each sdist, egg, or wheel out to a flat directory,” explains the developer in his blog post.
After extracting the packages, the developer ran a series of string and regex-based search operations via the grep utility and manually reviewed the results.
“The outcome of this simple approach was actually pretty impactful.”
The aws-login0tool package targets Windows machines and downloads a malicious 64-bit executable, normal.exe from the tryg[.]ga domain.
The malicious executable has been identified as a trojan by 38% of the antivirus engines on VirusTotal, as of writing:
On the contrary, dpp-client and dpp-client1234 target Linux systems and peek into environment variables, directory listing, and exfiltrate this information to the pt.traktrain[.]com domain.
These packages attempt to pry on select few directories including /mnt/mesos, indicating that the malware is specifically looking for files related to Apache Mesos, an open source cluster management product.
What remains a mystery is a large number of downloads and mirrors for these packages.
On a first glance, aws-login0tool appears to be a typosquatting attempt as the developer points out—’0′ and ‘-‘ keys being present next to each other on most keyboards. However, BleepingComputer is not aware of an active PyPI package named ‘aws-login-tool’ that a clever attacker might be tempted to impersonate. Although, one may have existed in the past.
BleepingComputer also observed the PyPI page for aws-login0tool, when alive, contained an explicit disclaimer instructing the user to not download the package:
“Please don’t use this… It does bad things… Oh, dear :(“
Likewise, project pages for dpp-client and dpp-client1234 packages, as seen by BleepingComputer, contained a simple “test” keyword in their description insinuating that were, quite likely part of a proof-of-concept exercise.
This development follows ongoing instances of malware and unwanted content targeting open source repositories like PyPI, npm, and RubyGems.
Last month, JFrog security research team had reported catching Discord info-stealers among other malicious PyPI packages that abused a “novel exfiltration” technique.
The same month, I wrote about a malicious PyPI package that made a crude attempt at typosquatting ‘boto3’—the Amazon Web Services SDK for Python.
July this year, six malicious PyPI packages were also caught mining cryptocurrency on developer machines.
Fortunately, the three aforementioned packages discovered by Scott were reported to PyPI admins on December 10th and removed swiftly.
Update 07:26 AM ET: Added quote from Scott.
PyPI removes ‘mitmproxy2’ over code execution concerns
Popular ‘coa’ NPM library hijacked to steal user passwords
TinyNuke info-stealing malware is again attacking French users
Hackers start pushing malware in worldwide Log4Shell attacks
Microsoft: These are the building blocks of QBot malware attacks
Not a member yet? Register Now
Amazon explains the cause behind Tuesday’s massive AWS outage
Hackers start pushing malware in worldwide Log4Shell attacks
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

Microsoft starts rolling out redesigned Notepad for Windows 11

Microsoft offers 50% subscription discounts to Office piratesRussian hacking group uses new…

Upgraded to log4j 2.16? Surprise, there's a 2.17 fixing DoS

TellYouThePass ransomware revived in Linux, Windows Log4j attacksCredit card info of 1.8…

Emotet botnet comeback orchestrated by Conti ransomware gang

US regulators order banks to report cyberattacks within 36 hoursHackers deploy Linux…

UK Labour Party discloses data breach after ransomware attack

CISA orders federal agencies to fix hundreds of exploited security flawsUS sanctions…