top of page
Betterworld Logo

PyPI Package Unmasked: Chimera Module Steals AWS, CI/CD, and macOS Data

A recent discovery on the Python Package Index (PyPI) has unveiled a malicious package, , designed to steal sensitive developer information. This package, masquerading as a helper module for Grab's Chimera Sandbox service, targeted users by harvesting credentials, configuration data, and environment variables, highlighting a growing sophistication in software supply chain attacks.

Python | BetterWorld Technology

PyPI Package Unmasked: A Sophisticated Data Theft Attempt

Cybersecurity researchers have identified a deceptive package on PyPI, , which was downloaded 143 times. This package was crafted to appear as a legitimate module for Grab's Chimera Sandbox, a platform for machine learning experimentation. However, its true purpose was to exfiltrate critical data from infected systems.

  • The malware employed a Domain Generation Algorithm (DGA) to connect to an external server, downloading a multi-stage Python-based information stealer.

  • The stealer was capable of siphoning a wide array of sensitive data, including AWS tokens, CI/CD environment variables, Jamf receipts, and macOS system information.

  • The collected data was then sent back to the attacker's domain, indicating a targeted approach towards corporate and cloud infrastructures.

Red Teaming Exercise or Genuine Threat?

In a surprising turn, Grab, the company behind Chimera Sandbox, stated that the package was part of an authorized red teaming exercise. According to Vincent Wong, Grab's head of cyber defense, the simulation aimed to test and enhance their internal security detection and response capabilities. Grab asserted that the package was not designed to steal credentials from non-Grab systems and was controlled internally.

Broader Supply Chain Vulnerabilities

This incident underscores a wider trend of malicious packages infiltrating open-source repositories. Recent reports have also highlighted similar threats in the npm ecosystem and the cryptocurrency development space.

  • Malicious npm Packages: Several npm packages, including eslint-config-airbnb-compat and solders, were found to execute remote code and download additional payloads. solders notably used advanced obfuscation techniques, including Unicode characters as variable names, to conceal a multi-stage attack leading to the deployment of Pulsar RAT.

  • Crypto Malware: The cryptocurrency and blockchain development ecosystem is increasingly targeted by credential stealers, cryptocurrency drainers, and cryptojackers. Examples include express-dompurify for harvesting browser credentials and bs58js for draining crypto wallets.

The Rise of Slopsquatting and AI-Assisted Threats

The advent of AI-assisted coding has introduced a new vulnerability known as "slopsquatting." This occurs when large language models (LLMs) hallucinate plausible but non-existent package names, which malicious actors can then register on public registries to conduct supply chain attacks. While advanced coding agents can reduce this risk, they do not eliminate it entirely, emphasizing the need for continuous vigilance in software development.

This evolving threat landscape necessitates proactive security research and robust update protocols to defend against sophisticated attacks targeting the software supply chain. As cyber threats become increasingly sophisticated, your security strategy must evolve to keep pace. BetterWorld Technology offers adaptive cybersecurity solutions that grow with the threat landscape, helping your business stay secure while continuing to innovate. Reach out today to schedule your personalized consultation.

Sources

  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data, The Hacker News.

Join our mailing list

bottom of page