BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Spyware circulates with impunity in the PyPI repository

    Sonatype, an information security company, discovered that the PyPI repository openly advertises an infostealer that can steal confidential data and send it to the attacker's Discord server.

    Researchers at Sonatype linked the campaign to Spanish-based MaaS-based SylexSquad. The group's malware has the uncomplicated name "reverse-shell". A reverse shell is a scheme in which the attacker's machine acts as a server and the victim's machine acts as a client and initiates a connection to the attacker's listening server.

    It turned out that the program is much more than a simple reverse shell. The program is capable of stealing the following information:

    • Credentials;
    • Browser history;
    • Files from the "Downloads" folder;
    • Cookies;
    • Credit card details;
    • Screenshots.
    "The infostealer has a low degree of obfuscation and looks like a Discord bot that executes commands on the infected machine. Malware can extract cookies, take screenshots, run shell commands, steal browsing history and send all this data to the attacker's Discord server," experts say.

    In addition, the functions of the program include the options "Clone a GitHub repository and execute a file", "Replace with the URL of the GitHub repository" and "The path where you want to clone the repository." Options indicate that the program works according to the MaaS model.

    Experts believe that such an open publication in a public repository can be a way for the group to deliberately draw attention to their product. In addition, hosting malicious files on PyPI gives attackers more control over them - hackers have the ability to delete, update, or even control payload versions.

    Among other benefits, hosting on PyPI allows malware to be distributed much more widely and can confuse many antivirus programs that use common signatures, such as actual bytes, to determine whether a file is malicious or not.

    In other words, instead of pre-delivering malware that virus scanners can quickly detect, hackers can simply link to their malicious code elsewhere. By providing a link to GitHub, attackers may bypass this check.

    Author DeepWeb
    RTM Locker attacks from the shadows, avoiding large targets and hiding from law enforcement
    Hackers leak Microsoft Bing and Cortana source code online

    Comments 0

    Add comment