Article Details

Scrape Timestamp (UTC): 2024-01-29 05:38:21.716

Source: https://thehackernews.com/2024/01/malicious-pypi-packages-slip-whitesnake.html

Original Article Text

Click to Toggle View

Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines. Cybersecurity researchers have identified malicious packages on the open-source Python Package Index (PyPI) repository that deliver an information stealing malware called WhiteSnake Stealer on Windows systems. The malware-laced packages are named nigpal, figflix, telerer, seGMM, fbdebug, sGMM, myGens, NewGends, and TestLibs111. They have been uploaded by a threat actor named "WS." "These packages incorporate Base64-encoded source code of PE or other Python scripts within their setup.py files," Fortinet FortiGuard Labs said in an analysis published last week. "Depending on the victim devices' operating system, the final malicious payload is dropped and executed when these Python packages are installed." While Windows systems are infected with WhiteSnake Stealer, compromised Linux hosts are served a Python script designed to harvest information. The activity, which predominantly targets Windows users, overlaps with a prior campaign that JFrog and Checkmarx disclosed last year. "The Windows-specific payload was identified as a variant of the [...] WhiteSnake malware, which has an Anti-VM mechanism, communicates with a C&C server using the Tor protocol, and is capable of stealing information from the victim and executing commands," JFrog noted in April 2023. It's also designed to capture data from web browsers, cryptocurrency wallets, and apps like WinSCP, CoreFTP, Windscribe, Filezilla, AzireVPN, Snowflake, Steam, Discord, Signal, and Telegram. Checkmarx is tracking the threat actor behind the campaign under the moniker PYTA31, stating the end goal is to exfiltrate sensitive and particularly crypto wallet data from the target machines. Some of the newly published rogue packages have also been observed incorporating clipper functionality to overwrite clipboard content with attacker-owned wallet addresses to carry out unauthorized transactions. A few others have been configured to steal data from browsers, applications, and crypto services. Fortinet said the finding "demonstrates the ability of a single malware author to disseminate numerous info-stealing malware packages into the PyPI library over time, each featuring distinct payload intricacies." The disclosure comes as ReversingLabs discovered two malicious packages on the npm package registry have been found to leverage GitHub to store Base64-encrypted SSH keys stolen from developer systems on which they were installed. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.

Daily Brief Summary

MALWARE // Python Packages Infected with WhiteSnake Malware Threaten Windows Users

Cybersecurity experts have discovered several malicious packages on the Python Package Index (PyPI) that secretly install WhiteSnake Stealer malware.

The nefarious packages target Windows operating systems, executing malware that can steal information and execute commands.

The malware has the capability to exfiltrate data from web browsers, cryptocurrency wallets, and various applications such as WinSCP, Discord, and Telegram.

WhiteSnake Stealer uses Anti-VM mechanisms and communicates with its control server using the Tor network, enhancing its stealth and persistence.

The threat actor, dubbed PYTA31, has introduced variations in the payloads of the malicious packages, indicating a focus on stealing particularly cryptocurrency wallet data.

Some packages also possess clipper functionality that can replace clipboard content with attacker-controlled cryptocurrency wallet addresses to facilitate unauthorized transactions.

Fortinet highlights the ease with which a single malware author can release multiple info-stealing malware packages onto the open-source repository, indicating a significant threat to software supply chain security.