Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

Omega Balla
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project’s logo.  The package employing this steganographic trickery is requests-darwin-lite, which has been

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project’s logo.

The package employing this steganographic trickery is requests-darwin-lite, which has been downloaded 417 times prior to it being taken down from the Python Package Index (PyPI) registry.

Requests-darwin-lite “appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into a large version of the actual requests side-bar PNG logo,” software supply chain security firm Phylum said.

The changes have been introduced in the package’s setup.py file, which has been configured to decode and execute a Base64-encoded command to gather the system’s Universally Unique Identifier (UUID).

In what’s an interesting twist, the infection chain proceeds only if the identifier matches a particular value, implying that the author(s) behind the package is looking to breach a specific machine to which they are already in possession of the identifier obtained through some other means.

This raises two possibilities: Either it’s a highly targeted attack or it’s some sort of a testing process ahead of a broader campaign.

Should the UUID match, the requests-darwin-lite proceeds to read data from a PNG file named “requests-sidebar-large.png,” which bears similarities with the legitimate requests package that ships with a similar file called “requests-sidebar.png.”

What’s different here is that while the real logo embedded within requests has a file size of 300 kB, the one contained inside requests-darwin-lite is around 17 MB.

The binary data concealed in the PNG image is the Golang-based Sliver, an open-source C2 framework that’s designed to be used by security professionals in their red team operations.

The exact end goal of the package is currently unclear, but the development is once again a sign that open-source ecosystems continue to be an attractive vector to distribute malware.

With a vast majority of codebases relying on open-source code, the steady influx of malware into npm, PyPI, and other package registries, not to mention the recent XZ Utils episode, has highlighted the need for addressing issues in a systematic manner that otherwise can “derail large swaths of the web.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

 The Hacker News 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

Next Post

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

Related Posts

Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign

Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link
Avatar
Read More

Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla, AsyncRAT, DCRat, NanoCore RAT, NjRAT, Pony, Remcos RAT, and XWorm. "This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands," Check Point said in a technical report. "This exploit has been used by multiple
Avatar
Read More