Article Details
Scrape Timestamp (UTC): 2024-11-22 06:18:59.028
Source: https://thehackernews.com/2024/11/pypi-attack-chatgpt-claude.html
Original Article Text
Click to Toggle View
PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries. Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer. The packages, named gptplus and claudeai-eng, were uploaded by a user named "Xeroline" in November 2023, attracting 1,748 and 1,826 downloads, respectively. Both libraries are no longer available for download from PyPI. "The malicious packages were uploaded to the repository by one author and, in fact, differed from each other only in name and description," Kaspersky said in a post. The packages purported to offer a way to access GPT-4 Turbo API and Claude AI API, but harbored malicious code that initiated the deployment of the malware upon installation. Specifically, the "__init__.py" file in these packages contained Base64-encoded data that contained code to download a Java archive file ("JavaUpdater.jar") from a GitHub repository ("github[.]com/imystorage/storage"). It also downloads the Java Runtime Environment (JRE) from a Dropbox URL if Java is not already installed on the host, before running the JAR file. The JAR file is a Java-based information stealer called JarkaStealer that can steal a wide range of sensitive information, including web browser data, system data, screenshots, and session tokens from various applications like Telegram, Discord, and Steam. In the final step, the collected information is archived, transmitted to the attacker's server, and then deleted from the victim's machine. JarkaStealer has been found to be offered under a malware-as-a-service (MaaS) model via a Telegram channel for anywhere between $20 and $50, although its source code has been leaked on GitHub. Statistics from ClickPy show that the packages were downloaded mainly by users located in the U.S., China, India, France, Germany, and Russia as part of the year-long supply chain attack campaign. "This discovery underscores the persistent risks of software supply chain attacks and highlights the critical need for vigilance when integrating open-source components into development processes," Kaspersky researcher Leonid Bezvershenko said.
Daily Brief Summary
Cybersecurity experts uncovered two malicious Python packages on the Python Package Index (PyPI) posing as popular AI models, seemingly offering API access but instead containing malware.
The identified packages, "gptplus" and "claudeai-eng," created by a user named "Xeroline," collectively attracted over 3,500 downloads before being removed from PyPI.
Both packages included hidden Base64-encoded data in the "__init__.py" file, which triggered the download and execution of a Java-based information stealer named JarkaStealer.
The malware could compromise sensitive data such as web browser information, system data, screenshots, and session tokens from applications like Telegram, Discord, and Steam.
JarkaStealer is sold as a part of a malware-as-a-service (MaaS) arrangement via a Telegram channel and its source code is available on GitHub.
The researchers highlighted that the primary victims of this malware were located in the U.S., China, India, France, Germany, and Russia, suggesting a targeted supply chain attack.
The incident underscores the importance of exercising caution when dealing with open-source components and the ongoing risk of software supply chain attacks.