Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer
29 Packages in Python Package Index have been uncovered.
Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI) which is the official third-party software repository for the Python programming language. The researchers have found out that the Packages aim to infect developers’ machines with a malware called W4SP Stealer.
“The main attack seems to have started around October 12, 2022, slowly picking up steam to a concentrated effort around October 22,” software supply chain security company Phylum said in a report published this week.
The list of offending packages is as follows: typesutil, typestring, sutiltype, duonet, fatnoob, strinfer, pydprotect, incrivelsim, twyne, pyptext, installpy, faq, colorwin, requests-httpx, colorsama, shaasigma, stringe, felpesviadinho, cypress, pystyte, pyslyte, pystyle, pyurllib, algorithmic, oiu, iao, curlapi, type-color, and pyhints.
Collectively, the packages have been downloaded more than 5,700 times, with some of the libraries (e.g., twyne and colorsama) relying on typosquatting to trick unsuspecting users into downloading them.
The fraudulent modules repurpose existing legitimate libraries by inserting a malicious import statement in the packages’ “setup.py” script to launch a piece of Python code that fetches the malware from a remote server.
W4SP Stealer, an open source Python-based trojan, comes with capabilities to pilfer files of interest, passwords, browser cookies, system metadata, Discord tokens, as well as data from the MetaMask, Atomic and Exodus crypto wallets.
W4SP Stealer has a history of being delivered through seemingly benign packages in the PyPI repository. In August, Kaspersky uncovered two libraries named pyquest and ultrarequests that were found to deploy the malware as a final payload.
The findings illustrate continued abuse of open source ecosystems to propagate malicious packages that are designed to harvest sensitive information and make way for supply chain attacks.
“As this is an ongoing attack with constantly changing tactics from a determined attacker, we suspect to see more malware like this popping up in the near future,” Phylum noted.
Responses