Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

PyPI Users Targeted With ‘Wacatac’ Trojan in New Supply Chain Attack

Fortinet warned of three malicious PyPI packages containing code that fetches the Wacatac trojan and information stealer.

Fortinet warns of three new malicious PyPI packages containing code designed to fetch the Wacatac trojan and information stealer as a next stage payload.

The three Python packages, ‘colorslib’, ‘httpslib’ and ‘libhttps’ were uploaded to PyPI (Python Package Index) on January 7 and January 12.

All three packages were published by the same author from a user account named ‘Lolip0p’, which joined the repository shortly before the packages were published.

The Python packages feature legitimate-looking descriptions, meant to trick users into believing they are clean. However, Fortinet discovered that all versions of these packages are, in fact, malicious.

Each package, the cybersecurity firm says, contains the same setup.py script and attempt to run a PowerShell script to download an executable binary from an external link.

The download URL has not been flagged as malicious by any of the antivirus products on VirusTotal, but the downloaded file is detected as malicious by a few of them.

Named ‘Oxyz.exe’, the executable has been designed to download another binary, called ‘update.exe’, which is executed from the victim’s temp folder. The binary drops additional files in the same folder.

Both the binary and one of the executables it fetches (SearchProtocolHost.exe) are flagged by several antivirus tools as ‘Wacatac’, a trojan and information stealer that targets login credentials, banking information, and other sensitive information.

Advertisement. Scroll to continue reading.

Wacatac can also be used to deploy additional malware on the victim’s machine, including ransomware, and perform other “actions of a malicious hacker’s choice”, according to Microsoft.

“Python end users should always perform due diligence before downloading and running any packages, especially from new authors. And as can be seen, publishing more than one package in a short time period is no indication that an author is reliable,” Fortinet concludes.

Related: PyPI Users Targeted With PoweRAT Malware

Related: Malicious PyPI Module Poses as SentinelOne SDK

Related: Python, JavaScript Developers Targeted With Fake Packages Delivering Ransomware

Related: Security Firms Find Over 20 Malicious PyPI Packages Designed for Data Theft

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.