• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malicious pypi packages slip whitesnake infostealer malware onto windows machines

Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines

You are here: Home / General Cyber Security News / Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines
January 29, 2024

Cybersecurity scientists have discovered malicious offers on the open-supply Python Package deal Index (PyPI) repository that provide an information thieving malware termed WhiteSnake Stealer on Windows units.

The malware-laced deals are named nigpal, figflix, telerer, seGMM, fbdebug, sGMM, myGens, NewGends, and TestLibs111. They have been uploaded by a threat actor named “WS.”

“These packages integrate Foundation64-encoded supply code of PE or other Python scripts inside of their set up.py documents,” Fortinet FortiGuard Labs reported in an analysis published final week.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Dependent on the target devices’ working method, the remaining malicious payload is dropped and executed when these Python packages are mounted.”

Cybersecurity

Whilst Windows devices are contaminated with WhiteSnake Stealer, compromised Linux hosts are served a Python script intended to harvest info. The exercise, which predominantly targets Windows people, overlaps with a prior marketing campaign that JFrog and Checkmarx disclosed previous yr.

“The Windows-distinct payload was discovered as a variant of the […] WhiteSnake malware, which has an Anti-VM system, communicates with a C&C server making use of the Tor protocol, and is able of thieving info from the target and executing commands,” JFrog mentioned in April 2023.

It can be also built to seize knowledge from web browsers, cryptocurrency wallets, and apps like WinSCP, CoreFTP, Windscribe, Filezilla, AzireVPN, Snowflake, Steam, Discord, Signal, and Telegram.

Checkmarx is monitoring the danger actor behind the campaign below the moniker PYTA31, stating the close aim is to exfiltrate sensitive and notably crypto wallet facts from the goal devices.

Some of the freshly released rogue packages have also been noticed incorporating clipper operation to overwrite clipboard articles with attacker-owned wallet addresses to carry out unauthorized transactions. A couple others have been configured to steal data from browsers, apps, and crypto solutions.

Cybersecurity

Fortinet stated the locating “demonstrates the capacity of a solitary malware author to disseminate quite a few info-thieving malware packages into the PyPI library more than time, each showcasing distinctive payload intricacies.”

The disclosure will come as ReversingLabs uncovered two destructive deals on the npm package registry have been uncovered to leverage GitHub to keep Base64-encrypted SSH keys stolen from developer devices on which they ended up mounted.

Discovered this short article appealing? Comply with us on Twitter  and LinkedIn to read through more unique articles we post.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «allakore rat malware targeting mexican firms with financial fraud tricks AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks
Next Post: NSA Admits Secretly Buying Your Internet Browsing Data without Warrants nsa admits secretly buying your internet browsing data without warrants»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.