Cybercriminals Abuse StackOverflow to Promote Malicious Python Package

Cybercriminals Abuse StackOverflow to Promote Malicious Python Package

May 29, 2024 at 01:51PM

Cybersecurity researchers have discovered a malicious Python package, “pytoileur,” in the Python Package Index repository, aiming to enable cryptocurrency theft. The package’s code executes a Base64-encoded payload to retrieve a Windows binary from an external server, establishing persistence and dropping spyware and data-stealing malware. This method signifies an unprecedented abuse of a credible platform for malware propagation.

Key takeaways from the meeting notes:

1. A new malicious Python package, “pytoileur,” has been discovered on the Python Package Index (PyPI) repository.
2. The package is designed to facilitate cryptocurrency theft as part of a broader campaign and has been downloaded 316 times.
3. The package’s author, “PhilipsPY,” uploaded a new version after the previous one was removed by PyPI maintainers.
4. The malicious code is embedded in the package’s setup.py script, executing a Base64-encoded payload to retrieve a Windows binary from an external server.
5. The retrieved binary, “Runtime.exe,” is run using Windows PowerShell and VBScript commands, establishing persistence and dropping additional payloads, including spyware and a stealer malware.
6. A newly created StackOverflow account, “EstAYA G,” has been directing users to install the rogue pytoileur package as a supposed solution.
7. The campaign is linked to the same threat actor(s) responsible for prior campaigns involving bogus Python packages such as Pystob and Pywool.
8. The use of open-source ecosystems as a vector for malware is a significant concern for developers globally.

Please let me know if you need any further information or if there are additional details you would like to include.

Full Article