Article Details
Scrape Timestamp (UTC): 2023-09-01 12:15:14.564
Original Article Text
Click to Toggle View
North Korean hackers behind malicious VMConnect PyPI campaign. North Korean state-sponsored hackers are behind the VMConnect campaign that uploaded to the PyPI (Python Package Index) repository malicious packages, one of them mimicking the VMware vSphere connector module vConnector. The packages were uploaded at the beginning of August, with one named VMConnect targeting IT professionals seeking virtualization tools At the time it was removed from the PyPI platform, VMConnect counted 237 downloads. Two more packages featuring the same code, published with the names‘ethter’ and ‘quantiumbase’ and also impersonating popular software projects, were downloaded 253 and 216 times, respectively. A report today from ReversingLabs, a software supply chain security company, attributes the campaign to Labyrinth Chollima, a subgroup of North Korean Lazarus hackers. The researchers discovered more packages that are part of the same VMConnect operation, namely ‘tablediter’ (736 downloads), ‘request-plus’ (43 downloads), and ‘requestspro’ (341 downloads). The first in the trio of newly discovered package appears to be an attempt to pass as a tool that helps with editing tables, while the other two impersonate the popular ‘requests’ Python library used for making HTTP requests. By appending the “plus” and “pro” suffixes to the name, the hackers make the entries look like versions of the standard, legitimate package with additional capabilities. The malicious packages feature the same description as the originals and contain minimal file structure and content differences, with the modifications primarily concerning the “__init__.py” file, which executes a malicious function from the ‘cookies.py’ that triggers data collection from the infected machine. The information is delivered to the attacker's command and control (C2) servers via a POST HTTP request. The server responds with a Python module that is obfuscated using Base64 and XOR and with execution parameters. The module also includes the download URL for the next stage payload, which researchers couldn't retrieve. Attribution confidence Although they did not analyze the final payload, ReversingLabs researchers say that they collected enough evidence to link the VMConnect campaign to the infamous North Korean Lazarus APT group. One argument is the discovery of the ‘builder.py’ file in the malicious packages, which contains the same payload decoding routine that JPCERT, Japan's Computer Security Incident Response Team (CSIRT) found on another file called ‘py_Qrcode.’ JPCERT attributed the code to another Lazarus subgroup they track as DangerousPassword. The functionality of that file is identical to a third one named ‘QRLog’ - a Java-based malware that Crowdstrike has attributed to Labyrinth Chollima with high confidence.
Daily Brief Summary
North Korean state-sponsored hackers are behind a campaign that uploaded malicious packages to the PyPI repository
The packages impersonated popular software projects such as the VMware vSphere connector module vConnector
The campaign is attributed to the Labyrinth Chollima subgroup of North Korean hackers known as Lazarus
The malicious packages featured minimal differences from the originals and contained a malicious function for data collection
Data collected from infected machines is sent to the attacker's command and control servers
The campaign is linked to Lazarus based on evidence such as the payload decoding routine found in the malicious packages
Attribution confidence is high due to similarities with other Lazarus subgroups and the malware they have been associated with