On November 24, 2024, malicious Python packages Zebo-0.1.0 and Cometlogger-0.1 were identified by Fortinet FortiGuard Lab’s AI-based detection system, posing a significant threat to unsuspecting users by targeting their sensitive data. These packages were found to steal user information through various means such as keylogging, screenshot capturing, and information exfiltration, establishing unauthorized control over infected systems.
Zebo-0.1.0, one of the identified malicious packages, exhibits typical malware characteristics by utilizing functions for surveillance, data exfiltration, and unauthorized control. This package employs obfuscation techniques to evade detection, making it challenging for security systems to detect its true malicious intent. The use of libraries like pynput and ImageGrab further enhances its capabilities to capture keystrokes and screenshots, compromising user privacy by transmitting sensitive information to remote servers. Additionally, Zebo-0.1.0 ensures persistence by creating startup scripts that re-execute upon system reboot, making removal difficult and increasing the risk of long-term damage.
Cometlogger-0.1, the other malicious package identified, also poses a significant threat by maintaining a long-term presence on infected systems. It utilizes advanced techniques, including obfuscation, keylogging, screen capturing, and data exfiltration, to compromise user data. By embedding a “webhook” into Python files, unauthorized users can manipulate the package for malicious intent, redirecting sensitive data to remote servers or facilitating command-and-control operations. Cometlogger-0.1 targets platforms like Discord, Steam, Instagram, and Twitter, stealing tokens, passwords, and account information while evading analysis through anti-VM detection techniques.
The impact of these malicious packages extends to developers and platforms reliant on PyPI, posing major privacy and security risks. Users who have installed these packages face potential data theft and unauthorized control over their systems, with significant implications for their privacy and security. The discovery of such malicious packages highlights the inherent risks associated with PyPI and the need for stringent security measures to protect against threats.
In light of these developments, it is essential for users to take proactive measures to safeguard their systems against potential malware threats. Disconnecting from the internet, isolating infected systems, using reputable antivirus software, and reformatting systems if necessary are crucial steps to mitigate the risks posed by malicious Python packages. By remaining vigilant and implementing robust security practices, users can protect themselves from falling victim to such malicious activities.
In conclusion, the identification of Zebo-0.1.0 and Cometlogger-0.1 as malicious Python packages underscores the ongoing challenges posed by cyber threats and the importance of maintaining a proactive approach to cybersecurity. By staying informed and implementing best practices, users can better protect themselves against evolving threats in an increasingly digital landscape.

