Security researcher and journalist Ax Sharma, published a report to reveal about four malicious packages he found in Python Package Index (PyPI) repository with malicious capabilities like deleting the netstat utility, dropping malware, and manipulating the SSH authorized_keys file. These malicious packages, aptx, bingchilling2, httops, and tkint3rs, have well thought out names to intentionally confuse people, which were downloaded over 450 times before taken down. While the malicious package 'aptx' is an attempt to impersonate Qualcomm's highly popular audio codec with similar name, httops and tkint3rs are typo squats of https and tkinter, respectively. Further, an examination of the malicious code embedded in the setup script reveals the presence of an obfuscated Meterpreter payload disguised as "pip," a legitimate Python package installer which would help in gaining shell access to the compromised host. Also, the malicious code contains a step for removing the netstat command-line utility that is used for monitoring network configuration and activity, along with modifying the '[.]ssh/authorized_keys file' that can set up an SSH backdoor for remote access. Similarly, Fortinet FortiGuard Labs found five packages 'web3-essential', '3m-promo-gen-api', 'ai-solver-gen', 'hypixel-coins', 'httpxrequesterv2', and 'httpxrequester' packages which are engineered to harvest and exfiltrate sensitive information. Additionally, ReversingLabs researcher found malicious npm packages dubbed as 'aabquerys' masquerading as legitimate abquery package to trick developers into downloading it. Moreover, the obfuscated JavaScript code has the capability that allows it to retrieve second-stage executable from a remote server which involves an Avast proxy binary (wsc_proxy[.]exe) that's known to be vulnerable to DLL side-loading attacks. After this a threat actor can connect to command-and-control (C2) server to fetch third-stage component, Demon[.]bin, which is a malicious agent generated using an open source, post-exploitation, command-and-control framework named Havoc, having RAT (remote access trojan) capabilities.
A supply chain attack involving compromised npm packages linked to Namastex Labs has been uncovered, delivering a modified CanisterWorm variant associated with TeamPCP. The campaig...
Windows has become the target of another zero-day attack after a hacker released the proof of concept exploit code on the Internet. Known as BlueHammer, the vulnerability, apparent...
Frances national document agency Agence nationale des titres securises ANTS has confirmed a cybersecurity incident that may have exposed personal data of users on its portal. The b...