Wednesday, December 11, 2024
HomeCyber AttackMalicious Python Package Attacking macOS Developers To Steal Google Cloud Logins

Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins

Published on

SIEM as a Service

Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive information, install malware, or create backdoors.

The method takes advantage of the widely-used repositories for packaging consequently creating a widespread impact with minimum effort from the attackers.

Cybersecurity researchers at CheckMarx recently identified that threat actors have been actively abusing a malicious package, “lr-utils-lib” to attack macOS developers to steal Google Cloud logins.

- Advertisement - SIEM as a Service

Malicious Python Package

It has been found that a malicious package called “lr-utils-lib” targets macOS systems to steal Google Cloud Platform credentials.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

This setup.py file of the package contains hidden code, which is activated during the installation, aimed specifically at macOS by checking system type and comparing the IOPlatformUUID of the device with a list of 64 pre-defined known hashes.

Once it finds a match, this malware tries to reach and take away sensitive data from ~/.config/gcloud/application_default_credentials.json files as well as credentials.db files.

All these will then be sent to a remote server (europe-west2-workload-422915.cloudfunctions.net).

Attack flow (Source – CheckMarx)

This sophisticated attack is linked to a fake LinkedIn profile under the name “Lucid Zenith” who claims to be the CEO of Apex Companies, LLC.

The incident revealed how advanced cyber threats are today in terms of combining malware distribution, social engineering tactics, and exploiting inconsistencies in AI search engines’ ability to verify information.

The “lr-utils-lib” malware attack was accompanied by a complex social engineering aspect of a fake LinkedIn account for “Lucid Zenith” who falsely claimed to be the CEO of Apex Companies, LLC.

Fake LinkedIn profile (Source – CheckMarx)

AI-driven search engines had insufficiently confirmed this trick, with some wrongly authenticating the false data.

This occurrence shows that threat actors can take advantage of flaws in information verification by AI systems and consequently it is important to check and double-check multiple sources when utilizing AI tools for research purposes.

The Python package “lr-utils-lib” reveals a targeted attack on macOS users who can steal Google Cloud credentials. For this reason, when working with third-party packages, one needs to be very careful about their security.

This event magnifies the broader cybersecurity problems that can arise from it such as having a fake LinkedIn profile and AI search engine verifiers that do not match with each other.

Software development and information-seeking techniques consequently require substantial scrutiny via rigorous vetting processes, multi-source verification, and critical thinking.

These types of attacks may begin by targeting individual developers, but they have far-reaching effects on enterprise security, which could cause data breaches and destroy reputations.

IOCs

  • europe-west2-workload-422915[.]cloudfunctions[.]net
  • lucid[.]zeniths[.]0j@icloud[.]com

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center...

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...