Cyber Security News

DangerousPassword Attacks Targeting Windows, macOS, and Linux Software Developers

Python-based malware targets Windows, linux, and macOS and is presumed to be used by dangerous password attack groups, also known as Crypto mimics.

This group has been active since June 2019 and employs various techniques to deliver malware to the victim’s machine.

JPCERT/CC released the latest article about attacks confirmed by the campaigns and shared their analysis report.

Targeting Windows

Since the attack vector of this campaign is unknown, the infection flow after the execution of the malware is similar to that of the Linkedin attack by this group.

Initially, the malware file of the Python module is delivered to the victim machine, which downloads additional malware once it gets executed by the user.

The malware downloads and runs additional MSI files externally using a Powershell script that is dropped after the execution.

The malware communicates with the C2 server every minute and is responsible for the download and execution of additional malware.

In addition, the secondary sample of the MSI file downloaded by the Powershell script encodes the user name, OS, process information, etc. of the infected device with BASE64 and sends it to the C2 server.

The flow of an attack in the Windows environment originating from Python malware

Also, it utilizes PythonHTTPBackdoor malware with simple commands to execute the attack, which has a function to detect the OS environment, and the commands executed are slightly different depending on the environment. 

Linux and macOS:

 In macOS and Linux environments, the file is decoded and saved as a log. tmp, and executed as a Python file. 

The user ID and OS environment information ​​are sent to the C2 server every minute and decoded with BASE64, saving it as

PythonHTTPBackdoor has ROT13-encoded git-related strings in the request string and generated file name, just like a log. tmp, which indicates that Git is used. You can see that it is targeting developers.

For example, the command id 501 is used to retrieve the network and process information, and 502 is used to execute the commands in Windows, Linux, and macOS machines.

Similarly, Mach-O malware JokerSPYand node.js malware are being used by this attack group to target the victims.

Indicator of compromise


Sujatha is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under her belt in Cyber Security, she is covering Cyber Security News, technology and other news.

Recent Posts

SSNDOB Marketplace Admin Jailed for Selling millions of Americans Data

In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii…

11 hours ago

Is Your Online Store Hacked in a Carding Attack? Here’s an Action Plan to Protect

Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using…

15 hours ago

Google Researchers Find Out How ChatGPT Queries Can Collect Personal Data

The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and…

15 hours ago

New Android Malware Employs Various Tactics to Deceive Malware Analyst

In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of…

17 hours ago

DJvu Ransomware Mimic as Cracked Software to Compromise Computers

A recent campaign has been observed to be delivering DJvu ransomware through a loader that…

18 hours ago

Okta Hack: Threat Actors Downloaded all Customer Support System Users’ Data

In a pivotal update to the Okta security incident divulged in October 2023, Okta Security…

19 hours ago