New PondRAT Malware Hidden in Python Packages Targets Software Developers

New PondRAT Malware Hidden in Python Packages Targets Software Developers

September 23, 2024 at 03:30AM

Threat actors linked to North Korea have been using poisoned Python packages to distribute a new malware called PondRAT, part of an ongoing campaign. The attacks are part of an operation known as Operation Dream Job and aim to compromise supply chain vendors and their customers. The attackers have been enhancing their capabilities across both Linux and macOS platforms.

Key Takeaways from Meeting Notes:

– Threat actors tied to North Korea are using poisoned Python packages to distribute a new malware called PondRAT as part of an ongoing campaign.
– PondRAT is a lighter version of the known macOS backdoor POOLRAT, previously attributed to the Lazarus Group.
– The campaign, known as Operation Dream Job, lures targets with fake job offers to trick them into downloading malware.
– The attackers uploaded poisoned Python packages to PyPI, linking the activity with moderate confidence to a threat actor called Gleaming Pisces, also tracked under different names by the wider cybersecurity community.
– The end goal of the attacks is to gain access to supply chain vendors and their customers’ endpoints.
– Analysis revealed that PondRAT has similarities with both POOLRAT and AppleJeus, including the distribution of new Linux variants of POOLRAT.
– The weaponization of legitimate-looking Python packages poses a significant risk to organizations, as successful installation can compromise an entire network.
– KnowBe4 reported being duped into hiring a North Korean threat actor as an employee, and warned of the serious risk posed by this type of complex, industrial, scaled nation-state operation for companies with remote-only employees.

Please let me know if you need further details or additional information.

Full Article