HomeCyber BalkansWatch out for harmful PyPI packages stealing login information

Watch out for harmful PyPI packages stealing login information

Published on

spot_img

Fortinet’s AI-driven OSS malware detection system recently identified two dangerous Python packages, Zebo-0.1.0 and Cometlogger-0.1, on November 16 and November 24, 2024, respectively, posing significant threats to users through advanced malware tactics. The discovery emphasizes the crucial need for robust cybersecurity measures to defend against such sophisticated threats.

The Zebo-0.1.0 package, known for its malicious behaviors, is designed to surveil users, exfiltrate sensitive data, and establish unauthorized control over systems. Its key functionalities include keylogging, screen capturing, data exfiltration to a remote Firebase database, and persistence mechanisms to ensure prolonged system presence. The use of obfuscation techniques complicates detection efforts, highlighting the complexity of this malware.

Cometlogger-0.1, another malicious package, goes a step further in sophistication by dynamically modifying files, stealing sensitive information, and bypassing security environments. It injects webhooks into files to exfiltrate usernames, passwords, and cryptocurrency wallet data, performs anti-VM checks to avoid detection in sandbox environments, and manipulates Python files during runtime to execute malicious commands discreetly. Its ability to extract encrypted credentials and card data from browser storage increases the risk of financial fraud and identity theft.

To mitigate the risks posed by these malicious packages, users and organizations are advised to follow cybersecurity best practices such as disconnecting and scanning affected systems, scrutinizing code before execution, implementing network monitoring for intrusion detection, and providing awareness training on phishing schemes and unsafe downloads. Fortinet customers are protected through updated AntiVirus services, including FortiGate and FortiClient tools tailored to detect and prevent these specific malware packages.

The discovery of Zebo-0.1.0 and Cometlogger-0.1 underscores the growing threats associated with open-source dependencies. These malicious packages demonstrate how attackers can use sophisticated techniques to evade detection, exfiltrate data, and target individuals and organizations. Maintaining heightened vigilance and leveraging advanced cybersecurity tools are essential in combating such threats effectively.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...