Cyber Security News

DangerousPassword Attacks Targeting Windows, macOS, and Linux Software Developers

Python-based malware targets Windows, linux, and macOS and is presumed to be used by dangerous password attack groups, also known as Crypto mimics.

This group has been active since June 2019 and employs various techniques to deliver malware to the victim’s machine.

JPCERT/CC released the latest article about attacks confirmed by the campaigns and shared their analysis report.

Targeting Windows

Since the attack vector of this campaign is unknown, the infection flow after the execution of the malware is similar to that of the Linkedin attack by this group.

Initially, the malware file of the Python module is delivered to the victim machine, which downloads additional malware once it gets executed by the user.

The malware downloads and runs additional MSI files externally using a Powershell script that is dropped after the execution.

The malware communicates with the C2 server every minute and is responsible for the download and execution of additional malware.

In addition, the secondary sample of the MSI file downloaded by the Powershell script encodes the user name, OS, process information, etc. of the infected device with BASE64 and sends it to the C2 server.

The flow of an attack in the Windows environment originating from Python malware

Also, it utilizes PythonHTTPBackdoor malware with simple commands to execute the attack, which has a function to detect the OS environment, and the commands executed are slightly different depending on the environment. 

Linux and macOS:

 In macOS and Linux environments, the file is decoded and saved as a log. tmp, and executed as a Python file. 

The user ID and OS environment information ​​are sent to the C2 server every minute and decoded with BASE64, saving it as

PythonHTTPBackdoor has ROT13-encoded git-related strings in the request string and generated file name, just like a log. tmp, which indicates that Git is used. You can see that it is targeting developers.

For example, the command id 501 is used to retrieve the network and process information, and 502 is used to execute the commands in Windows, Linux, and macOS machines.

Similarly, Mach-O malware JokerSPYand node.js malware are being used by this attack group to target the victims.

Indicator of compromise


Sujatha is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under her belt in Cyber Security, she is covering Cyber Security News, technology and other news.

Recent Posts

AT&T Massive Data Breach – Affecting Nearly All Customers’ Call & Text Records

AT&T, one of the largest telecommunications companies in the United States, has disclosed a significant…

8 hours ago

FishXProxy Fuels Phishing Attacks with Clever Deceptive Attacks

Imagine receiving an email that looks legitimate, down to the last detail. This is the…

11 hours ago

Beware of Phishing Attack that Abuses SharePoint Servers

A massive phishing campaign exploits Microsoft SharePoint servers to host malicious PDFs containing phishing links.…

12 hours ago

Apple Warns of Users in 98 Countries of Targeted Spyware Attacks

Apple has alerted iPhone users in 98 countries about potential mercenary spyware attacks. This marks…

14 hours ago

Citrix NetScaler ADC & Gateway Impacted by regreSSHion RCE Vulnerability

Qualys discovered a critical remote unauthenticated code execution (RCE) vulnerability, CVE-2024-6387, in OpenSSH’s server (sshd).…

14 hours ago

4000+ Domains Used By FIN7 Actors Mimic Popular Brands

Russian-linked FIN7 (aka Sangria Tempest, ATK32, Carbon Spider, Coreid, ELBRUS, G0008, G0046, and GOLD NIAGARA)…

15 hours ago