• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
beware: 3 malicious pypi packages found targeting linux with crypto

Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

You are here: Home / General Cyber Security News / Beware: 3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners
January 4, 2024

A few new destructive offers have been found out in the Python Deal Index (PyPI) open up-resource repository with abilities to deploy a cryptocurrency miner on afflicted Linux devices.

The a few hazardous packages, named modularseven, driftme, and catme, attracted a whole of 431 downloads above the previous month ahead of they were being taken down.

“These deals, on first use, deploy a CoinMiner executable on Linux products,” Fortinet FortiGuard Labs researcher Gabby Xiong said, incorporating the marketing campaign shares overlaps with a prior marketing campaign that included the use of a deal termed culturestreak to deploy a crypto miner.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The destructive code resides in the __init__.py file, which decodes and retrieves the initially stage from a distant server, a shell script (“unmi.sh”) that fetches a configuration file for the mining activity as very well as the CoinMiner file hosted on GitLab.

The ELF binary file is then executed in the track record working with the nohup command, thus making sure that the procedure continues to run after exiting the session.

“Echoing the tactic of the previously ‘culturestreak’ package deal, these offers conceal their payload, successfully minimizing the detectability of their destructive code by hosting it on a distant URL,” Xiong said. “The payload is then incrementally launched in a variety of stages to execute its malicious routines.”

The connections to the culturestreak deal also stems from the point that the configuration file is hosted on the area papiculo[.]net and the coin mining executables are hosted on a general public GitLab repository.

Cybersecurity

Just one noteworthy enhancement in the 3 new packages is the introduction of an excess stage by concealing their nefarious intent in the shell script, therefore serving to it evade detection by security program and lengthening the exploitation system.

“Also, this malware inserts the destructive commands into the ~/.bashrc file,” Xiong stated. “This addition makes certain the malware’s persistence and reactivation on the user’s machine, properly extending the length of its covert procedure. This approach aids in the extended, stealthy exploitation of the user’s machine for the attacker’s reward.”

Uncovered this write-up intriguing? Abide by us on Twitter  and LinkedIn to browse extra distinctive material we post.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «uac 0050 group using new phishing tactics to distribute remcos rat UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT
Next Post: Three Ways To Supercharge Your Software Supply Chain Security three ways to supercharge your software supply chain security»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.