The pirates divert your typing faults to plant stealth malware – and even the best antivirus might not catch it

- A single typing fault could allow hackers to divert your system using malicious software hidden in false packages
- Multiplateform malicious software is now experienced developers even by imitating the names of open source of confidence packages
- The attackers exploit the confidence of developers with useful furtive loads which dodge the tools for the protection of malicious software
A new supply chain attack has revealed to what extent as harmless as a typo can open the door to serious threats of cybersecurity, experts warned.
A report of Checkmarx The claims of malicious actors use intelligent tips to deceive developers in downloading false packages, which can then give hackers control of their systems.
The attackers mainly target colorama users, a popular Python package, and Colorizr, a similar tool used in JavaScript (NPM).
Deceptive packages and threatening typing mistakes
“This campaign targets users of Python and NPM on Windows and Linux via typosquat attacks and name confusion,” said Ariel Harush, researcher at Checkmarx.
The attackers use a technique called typosquat. For example, instead of “Colorama”, a developer can accidentally type “Col0rama” or “Coloramaa” and download a harmful version.
These false packages have been downloaded from the Pypi repository, which is the main source of Python libraries.
“We have found malicious Python (Pypi) packages as part of a typosquat campaign. The malicious packages allow remote control, persistence, etc., ”said Darren Meyer, defender of security research at Checkmarx.
What makes this campaign unusual is that the attackers mixed the names of different ecosystems, using names of the NPM World (JavaScript) to deceive Python users.
This multiplatform targeting is rare and suggests a more advanced and potentially coordinated strategy.
The useful loads of Windows and Linux have download hours and similar names, but use different tools, tactics and infrastructures, which means that they may not come from the same source.
Once installed, false packages can make serious damage – on Windows systems, malware creates planned tasks to maintain persistence and harvest variables, which could include sensitive identification information.
He also tries to deactivate the best antivirus software using PowerShell commands like set -imimpreference -AtableioAvProtection $ True.
On Linux systems, packages like Colorzator and Coloraiz transport useful loads coded to create encrypted reverse shells, communicate via platforms like Telegram and Discord, and exfiltrate data in services such as pastebin.
These scripts are not executed at the same time; They are designed for stealth and persistence, using techniques such as mascarading as a core process and the editing of RC.Local and Crontabs for automatic execution.
Although the malicious plans have been removed from public standards, the threat is far from over.
The developers must be very cautious during the installation of packages, because even the best platforms for the protection of ending points have trouble with these elusive tactics. Always check the spelling and make sure the package comes from a source of confidence.
Checkmarx recommends that organizations to audit all deployed and deployable packages proactively examine the application code, examine private standards and block known malicious names.