Cyber security news for all


    Lazarus Group’s Clever Ruse: Typosquatting on PyPI to Deploy Malware

    In a cunning display of cyber subterfuge, the infamous Lazarus Group, operating under North Korean auspices, has once again demonstrated its adeptness at infiltrating the digital realm. This time, their stratagem involved the Python Package Index (PyPI), a repository revered by developers for its vast collection of software packages. The group’s ploy? Uploading seemingly innocuous packages laden with malicious intent.

    Four packages—pycryptoenv, pycryptoconf, quasarlib, and swapmempool—served as the group’s digital trojan horses. Although they have since been purged from the repository, their impact lingers, with a collective download tally reaching 3,269. The package pycryptoconf emerged as the most sought-after, boasting 1,351 downloads, a testament to the deceptive allure of these malicious parcels.

    The choice of package names was far from arbitrary. By mimicking the legitimate pycrypto package, a staple in Python’s encryption toolkit, the attackers banked on a simple yet effective human error: typos. This tactic, known as typosquatting, preys on the inadvertent slip of a finger, transforming a routine installation into a cybersecurity nightmare.

    This revelation follows closely on the heels of a discovery by Phylum, which unearthed a similar scheme targeting the npm registry. Dubbed Contagious Interview, this campaign also leveraged innocuous code to mask its nefarious purposes. Both operations shared a modus operandi, embedding the malware within a test script,, which, in reality, harbored an XOR-encoded DLL file. This file subsequently births two additional DLLs, IconCache.db and NTUSER.DAT, orchestrating a domino effect that culminates in the execution of Comebacker malware.

    Comebacker’s role in this digital ballet is crucial; it establishes a lifeline to a command-and-control (C2) server, pulling the strings to download and execute further malicious payloads. This sophisticated chain of events underscores the attackers’ ingenuity and their relentless pursuit of novel infiltration methods.

    This recent campaign is not an isolated incident but rather a continuation of a narrative that began in November 2023, when Phylum first shed light on the use of crypto-themed npm modules to disseminate Comebacker. The persistence of such tactics highlights a troubling trend: the exploitation of human error and the abuse of trusted repositories to further malicious ends.

    The Lazarus Group’s latest escapade serves as a stark reminder of the perennial cat-and-mouse game that defines cybersecurity. Developers, the custodians of our digital infrastructure, are urged to tread with utmost caution, vigilantly verifying the authenticity of the packages they incorporate into their projects. In this digital age, even a simple typo can open the door to unprecedented risks, making diligence and awareness indispensable allies in the ongoing battle against cyber threats.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here