merkurynews.biz.id Open in urlscan Pro
2a06:98c1:3120::9  Public Scan

URL: https://merkurynews.biz.id/pypi-users-targeted-with-powerat-malware/
Submission: On January 11 via manual from US — Scanned from NL

Form analysis 2 forms found in the DOM

GET https://merkurynews.biz.id/

<form action="https://merkurynews.biz.id/" method="get" class="search-form">
  <label class="assistive-text"> Search </label>
  <div class="input-group">
    <input type="search" value="" placeholder="Search" class="form-control s" name="s">
    <div class="input-group-prepend">
      <button class="btn btn-theme">Search</button>
    </div>
  </div>
</form>

POST https://merkurynews.biz.id/wp-comments-post.php

<form action="https://merkurynews.biz.id/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="">
  <p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p>
  <p class="comment-form-comment"><label for="comment">Comment <span class="required">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required=""></textarea></p>
  <p class="comment-form-author"><label for="author">Name <span class="required">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" autocomplete="name" required=""></p>
  <p class="comment-form-email"><label for="email">Email <span class="required">*</span></label> <input id="email" name="email" type="email" value="" size="30" maxlength="100" aria-describedby="email-notes" autocomplete="email" required=""></p>
  <p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="url" value="" size="30" maxlength="200" autocomplete="url"></p>
  <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes"> <label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time
      I comment.</label></p>
  <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="109318" id="comment_post_ID">
    <input type="hidden" name="comment_parent" id="comment_parent" value="0">
  </p>
  <p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="fcdc8d97e1"></p>
  <p style="display: none !important;"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="1673454918881">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

Text Content

Skip to content
 * Wednesday, January 11, 2023


MERKURYNEWS

Trending News. Latest news from world and many more

Search
Search
 * Home
 * Pages
   * About
   * Contact


   
   
 * Home
 * Download
 * PyPI users targeted with PoweRAT malware

Download


PYPI USERS TARGETED WITH POWERAT MALWARE

January 10, 2023
everglow

Software supply chain security company Phylum has identified a malicious attack
targeting Python Package Index (PyPI) users with the PoweRAT backdoor and
information stealer.

The campaign was first discovered on December 22, 2022, when a malicious package
called PyroLogin was identified as Python malware designed to fetch code from a
remote server and silently execute it.

Between December 28th and 31st, Phylum security researchers observed that five
more packages containing PyroLogin-like code for PyPI were released:
EasyTimeStamp, Discord, Discord-dev, Style.py, and PythonStyles.

The chain of infection, which involves running various scripts and abusing
legitimate operating system functions, starts with a setup.py file, which means
that the malware is distributed automatically when the malicious packages are
installed using pip.

Phylum’s analysis of the execution process revealed the use of obfuscation and
attempts to prevent static analysis. To prevent victims from raising suspicions,
a message is displayed claiming that “dependencies” are installed while the
malicious code runs in the background.

The infection chain also involves the installation of several potentially
invasive packages, including libraries that allow the attackers to control and
monitor mouse and keyboard input and capture the screen, as well as placing
malicious code in the Windows startup folder for persistence.

Once running on the victim’s computer, the malware enables the attackers to
steal sensitive information such as browser cookies and passwords, crypto
wallets, Discord tokens, and Telegram data. The collected information is
exfiltrated into a ZIP archive.

The malware also attempts to download and install on the victim’s computer
Cloudflared, a Cloudflare command-line tunneling client that allows the
attackers to access a Flask app on the victim’s system without modifying the
firewall.

As a command-and-control (C&C) client, the Flask app allows attackers to extract
information such as usernames, IPs, and machine details, run shell commands,
download and run remote files, and even run arbitrary Python code.

The malware, which acts as an information thief combined with a remote access
trojan (RAT), also includes a feature that sends attackers a constant stream of
images of the victim’s screen, allowing them to trigger mouse clicks and
keystrokes.

The malware is called Xrat, but Phylum chose to call it “PoweRAT” “because of
its reliance on PowerShell early in the attack chain”.

“This thing is like a RAT on steroids. It has all the basic RAT functionality
integrated into a nice web GUI with a rudimentary remote desktop feature and
stealer to boot! Even if the attacker fails to establish persistence or fails to
get the remote desktop utility to work, the thief part will still send whatever
it finds,” concludes Phylum.

See also: Malicious PyPI module impersonates SentinelOne SDK

Related: Python, JavaScript developers targeted with bogus packages delivering
ransomware

Related: Malware Delivered to PyTorch Users in a Supply Chain Attack





Ionut Arhire is international correspondent for SecurityWeek.

Previous columns by Ionut Arhire:
tags:



Source


Tags: Attack on the supply chain, back door, download, information thief,
PowerRAT, PyPI, python, tribe, xrat


POST NAVIGATION

When is A Man Called Otto coming to Netflix?
Happy way to start the new year


LEAVE A REPLY CANCEL REPLY

Your email address will not be published. Required fields are marked *

Comment *

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.





Δ




YOU MAY MISSED

Score


10 PLAYERS WHO SET CAREER HIGH-SCORING NUMBERS

January 11, 2023
everglow
Live Score


PRITHVI SHAW SHAW AFTER A RECORD 379 AGAINST ASSAM

January 11, 2023
everglow
Highlights


EDMUNDS HIGHLIGHTS KEY AUTO TECH TRENDS AT CES 2023

January 11, 2023
everglow
Thanksgiving


DID DIAMOND OF DIAMOND AND SILK DIE FROM COVID-19?!

January 11, 2023
everglow
Copyright © 2023 Merkurynews
Privacy Policy
Theme by: Theme Horse
Proudly Powered by: WordPress