Man
Professional
- Messages
- 3,046
- Reaction score
- 570
- Points
- 113
The Jarka malware used PyPI for a global attack.
Kaspersky Lab experts discovered an attack on the software supply chain that lasted almost a year. Malicious packages disguised as tools for creating chatbots based on neural networks were distributed through the PyPI repository. Once installed, these packages infected devices with Jarka stealer, which was used to steal data.
Malicious packages appeared on the PyPI platform in November 2023 and were downloaded 1.7 thousand times by users from 30 countries before they were identified. The greatest interest in them was shown in the United States, China, France, Germany and Russia. The attack did not appear to have targeted specific regions or organizations.
The packets were disguised as shells for popular neural network chatbots, such as OpenAI's ChatGPT and Anthropic's Claude AI. They provided access to the functionality of chatbots, while installing the Jarka stealer, written in the Java language. The malware is capable of stealing data from browsers, taking screenshots, collecting system information, intercepting session tokens from applications such as Telegram, Discord, and Steam, and manipulating browser processes to extract stored data.
Jarka was distributed through a Telegram channel using the MaaS (Malware as a Service) model, and the source code was uploaded to GitHub, making it available for download. Linguistic features in the code and advertising materials point to a Russian-speaking developer.
The malicious packages were removed after the platform's notification, however, the attack highlighted the risks associated with the integration of open-source components. Experts emphasize the importance of checking the integrity of the code at all stages of development to prevent such threats.
Source
Kaspersky Lab experts discovered an attack on the software supply chain that lasted almost a year. Malicious packages disguised as tools for creating chatbots based on neural networks were distributed through the PyPI repository. Once installed, these packages infected devices with Jarka stealer, which was used to steal data.
Malicious packages appeared on the PyPI platform in November 2023 and were downloaded 1.7 thousand times by users from 30 countries before they were identified. The greatest interest in them was shown in the United States, China, France, Germany and Russia. The attack did not appear to have targeted specific regions or organizations.
The packets were disguised as shells for popular neural network chatbots, such as OpenAI's ChatGPT and Anthropic's Claude AI. They provided access to the functionality of chatbots, while installing the Jarka stealer, written in the Java language. The malware is capable of stealing data from browsers, taking screenshots, collecting system information, intercepting session tokens from applications such as Telegram, Discord, and Steam, and manipulating browser processes to extract stored data.
Jarka was distributed through a Telegram channel using the MaaS (Malware as a Service) model, and the source code was uploaded to GitHub, making it available for download. Linguistic features in the code and advertising materials point to a Russian-speaking developer.
The malicious packages were removed after the platform's notification, however, the attack highlighted the risks associated with the integration of open-source components. Experts emphasize the importance of checking the integrity of the code at all stages of development to prevent such threats.
Source