icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo


Summary:

Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project's logo. The package employing this steganographic trickery is requests-darwin-lite, which has been downloaded 417 times prior to it being taken down from the Python Package Index (PyPI) registry. Requests-darwin-lite "appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into a large version of the actual requests side-bar PNG logo," software supply chain security firm Phylum said. The changes have been introduced in the package's setup.py file, which has been configured to decode and execute a Base64-encoded command to gather the system's Universally Unique Identifier (UUID).

Security Officer Comments:
This discovery of the requests-darwin-lite package underscores the evolving sophistication of malware distribution tactics within open-source ecosystems. By exploiting the trust associated with well-known libraries like requests, threat actors can effectively conceal malicious payloads, such as the Golang-based Sliver framework, within innocuous-seeming files. The deliberate inclusion of steganographic techniques, such as hiding executable code within a PNG image, showcases a level of ingenuity aimed at bypassing traditional security measures.

Suggested Corrections:
This incident underscores the critical importance of robust supply chain security practices within the software development lifecycle. As open-source ecosystems continue to grow, it is imperative for organizations and developers to implement proactive measures to detect and mitigate such threats, safeguarding against potential exploitation of trust in widely-used libraries and packages.

Link(s):
https://thehackernews.com/2024/05/malicious-python-package-hides-sliver.html