Article 6GAH9 Highly Invasive Backdoors Hidden in Python Obfuscation Packages, Downloaded by 2,348 Developers

Highly Invasive Backdoors Hidden in Python Obfuscation Packages, Downloaded by 2,348 Developers

by
EditorDavid
from Slashdot on (#6GAH9)
The senior security editor at Ars Technica writes:Highly invasive malware targeting software developers is once again circulating in Trojanized code libraries, with the latest ones downloaded thousands of times in the last eight months, researchers said Wednesday. Since January, eight separate developer tools have contained hidden payloads with various nefarious capabilities, security firm Checkmarx reported. The most recent one was released last month under the name "pyobfgood." Like the seven packages that preceded it, pyobfgood posed as a legitimate obfuscation tool that developers could use to deter reverse engineering and tampering with their code. Once executed, it installed a payload, giving the attacker almost complete control of the developera(TM)s machine. Capabilities include: - Exfiltrate detailed host information- Steal passwords from the Chrome web browser- Set up a keylogger- Download files from the victim's system- Capture screenshots and record both screen and audio- Render the computer inoperative by ramping up CPU usage, inserting a batch script in the startup directory to shut down the PC, or forcing a BSOD error with a Python script- Encrypt files, potentially for ransom- Deactivate Windows Defender and Task Manager- Execute any command on the compromised host In all, pyobfgood and the previous seven tools were installed 2,348 times. They targeted developers using the Python programming language... Downloads of the package came primarily from the US (62%), followed by China (12%) and Russia (6%) Ars Technica concludes that "The never-ending stream of attacks should serve as a cautionary tale underscoring the importance of carefully scrutinizing a package before allowing it to run."

twitter_icon_large.pngfacebook_icon_large.png

Read more of this story at Slashdot.

External Content
Source RSS or Atom Feed
Feed Location https://rss.slashdot.org/Slashdot/slashdotMain
Feed Title Slashdot
Feed Link https://slashdot.org/
Feed Copyright Copyright Slashdot Media. All Rights Reserved.
Reply 0 comments