Article Details
Scrape Timestamp (UTC): 2023-10-04 21:36:50.680
Original Article Text
Click to Toggle View
Hundreds of malicious Python packages found stealing sensitive data. A malicious campaign that researchers observed growing more complex over the past half year, has been planting on open-source platforms hundreds of info-stealing packages that counted about 75,000 downloads. The campaign has been monitored since early April by analysts at Checkmarx's Supply Chain Security team, who discovered 272 packages with code for stealing sensitive data from targeted systems. The attack has evolved significantly since it was first identified, with the package authors implementing increasingly more sophisticated obfuscation layers and detection evading techniques. Data and crypto theft The researchers say that they starting seeing a pattern "within the Python ecosystem starting from early April 2023." One example provided is the “_init_py” file, which loads only after checking it's running on a target system and not in a virtualized environment - a typical a sign of a malware analysis host. Once it launches, it targets the following information on the infected systems: Additionally, the malware can take screenshots and steal individual files from the compromised system such as the Desktop, Pictures, Documents, Music, Videos, and Downloads directories. The victim’s clipboard is also monitored constantly for cryptocurrency addresses, and the malware swaps them with the attacker’s address to divert payments to wallets under their control. The analysts estimate that the campaign has directly stolen approximately $100,000 in cryptocurrency. App manipulation Checkmarx reports that the malware used in this campaign goes a step further from typical info-stealing operations, engaging in app data manipulation to perform a more decisive blow. For example, the electron archive of the Exodus cryptocurrency wallet management app is replaced to alter core files, enabling the attackers to bypass Content-Security-Policy and exfiltrate data. On Discord, if certain settings are enabled, the malware injects JavaScript code that executes when the client restarts. The malware also employs a PowerShell script in an elevated terminal to manipulate Windows “hosts” so that security products running on the breached device cannot contact their servers. Evolution of the attack According to the researchers, the malicious code from this campaign in packages from April was clearly visible, as it was plain text. In May, though, the authors of the packages started adding encryption to hinder analysis. In August, the researcher noticed that multi-layer obfuscation had been added to the packages. In a separate report by Checkmarx’s researcher Yahuda Gelb, it was mentioned that two of the most recent packages used no less than 70 layers of obfuscation. Also in August, the malware developers included the capability to turn off antivirus products, added Telegram to the list of targeted apps, and introduced a fallback data exfiltration system. The researchers warn that open-source communities and developer ecosystems continue to be susceptible to supply chain attacks, and threat actors upload malicious packages on widely used repositories and version control systems, such as GitHub, or package regitries like PyPi and NPM, daily. Users are recommended to scrutinize the projects and package publishers they trust and be vigilant about typosquatting package names. A list of the malicious packages used in this campaign is available here.
Daily Brief Summary
Checkmarx's Supply Chain Security team has been monitoring a progressively sophisticated malware campaign since April 2023.
The campaign disseminates hundreds of malicious Python packages designed to steal sensitive data, which have been downloaded around 75,000 times.
This operation has matured since first identified, with the package authors using increasingly elaborate obfuscation layers and detection evading techniques to steal data and cryptocurrency.
The malware can capture screenshots and steal files, while also monitoring the victim's clipboard for cryptocurrency addresses
which it then substitutes with the attacker's address to channel payments to their wallets.
In addition to data theft, this malware manipulates app data; for instance, it alters the electron archive of the Exodus cryptocurrency wallet management app to intercept data and injects JavaScript code into Discord.
The threat actors have increasingly employed encryption, multi-layer obfuscation and the ability to disable antivirus products to hinder the detection of their packages.
The security analysts emphasise the vulnerability of open-source communities and developer ecosystems to such supply chain attacks, advising users to scrutinise the projects and package publishers they rely on.