Article Details

Scrape Timestamp (UTC): 2024-05-29 17:27:27.021

Source: https://thehackernews.com/2024/05/cybercriminals-abuse-stackoverflow-to.html

Original Article Text

Click to Toggle View

Cybercriminals Abuse StackOverflow to Promote Malicious Python Package. Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI) repository to facilitate cryptocurrency theft as part of a broader campaign. The package in question is pytoileur, which has been downloaded 316 times as of writing. Interestingly, the package author, who goes by the name PhilipsPY, has uploaded a new version of the package (1.0.2) with identical functionality after a previous version (1.0.1) was yanked by PyPI maintainers on May 28, 2024. According to an analysis released by Sonatype, the malicious code is embedded in the package's setup.py script, allowing it to execute a Base64-encoded payload that's responsible for retrieving a Windows binary from an external server. "The retrieved binary, 'Runtime.exe,' is then run by leveraging Windows PowerShell and VBScript commands on the system," security researcher Ax Sharma said. Once installed, the binary establishes persistence and drops additional payloads, including spyware and a stealer malware capable of gathering data from web browsers and cryptocurrency services. Sonatype said it also identified a newly created StackOverflow account called "EstAYA G" responding to users' queries on the question-and-answer platform, directing them to install the rogue pytoileur package as a supposed solution to their issues. "While definitive attribution is challenging when assessing pseudonymous user accounts on internet platforms without access to logs, the recent age of both of these user accounts and their sole purpose of publishing and promoting the malicious Python package gives us a good indication that these are linked to the same threat actor(s) behind this campaign," Sharma told The Hacker News. The development marks a new escalation in that it abuses a credible platform as a propagation vector for malware. "The unprecedented open abuse of such a credible platform, using it as a breeding ground for malicious campaigns, is a huge warning sign for developers globally," Sonatype further said in a statement shared with The Hacker News. "StackOverflow's compromise is especially concerning given the large number of novice developers it has, who are still learning, asking questions, and may fall for malicious advice." A closer examination of the package metadata and its authorship history has revealed overlaps with a prior campaign involving bogus Python packages such as Pystob and Pywool, which was disclosed by Checkmarx in November 2023. The findings are another example of why open-source ecosystems continue to be a magnet for threat actors looking to compromise several targets all at once with information stealers like Bladeroid and other malware by means of what's called a supply chain attack.

Daily Brief Summary

MALWARE // Malicious Python Package Discovered on PyPI Steals Cryptocurrency

Cybersecurity experts uncovered a malicious Python package called pytoileur on the Python Package Index (PyPI), designed to steal cryptocurrency.

The malicious package was downloaded 316 times and camouflages its malevolent activities within legitimate-looking functionality.

PyPI had previously removed an older version of the package, but a new version was uploaded by the same author, PhilipsPY, with identical harmful capabilities.

The package executes a Base64-encoded payload that retrieves a Windows binary, which then installs spyware and data stealer malware affecting web browsers and crypto services.

An associated StackOverflow account "EstAYA G" was identified directing users to install the rogue package, potentially linking to the same threat actor.

The abuse of such credible platforms like StackOverflow for distributing malware highlights significant risks for developers, especially novices.

Similarities in package metadata and authorship link this campaign to previous malicious endeavors involving fake Python packages.

Open-source ecosystems are pointed out as significant targets for cybercriminals attempting supply chain attacks via information-stealing malware.