Kaspersky Researchers Identify Malicious PyPI Packages Linked to OceanLotus
AI-generated from multiple sources. Verify before acting on this reporting.
MOSCOW (AP) — Cybersecurity researchers at Kaspersky have identified three malicious Python Package Index (PyPI) packages designed to distribute the ZiChatBot malware family across Windows and Linux systems. The packages utilize Zulip APIs as command-and-control infrastructure to manage infected machines.
The discovery, announced Wednesday, marks a new operational tactic for the threat group suspected behind the campaign, OceanLotus, also known as APT32. The malicious packages appear legitimate on the surface but contain code that establishes persistent connections to Zulip servers, allowing attackers to issue remote commands and exfiltrate data from compromised systems.
ZiChatBot, a malware family previously associated with targeted espionage operations, has evolved to exploit the trust users place in open-source software repositories. The three identified packages were uploaded to PyPI, a primary repository for Python software, where they were available for download by developers and automated build systems. Once installed, the malware executes scripts that communicate with the Zulip platform, bypassing traditional security measures that monitor for known malicious domains.
The attack infrastructure relies on the Zulip messaging service, which is widely used for team communication. By leveraging Zulip's APIs, the attackers can blend their command-and-control traffic with legitimate application data, making detection more difficult for network security tools. The malware is capable of executing arbitrary commands, stealing credentials, and establishing backdoors on both Windows and Linux operating systems.
Kaspersky researchers noted that the packages were designed to evade detection by mimicking popular legitimate libraries. The code includes obfuscation techniques to hide the malicious payload until it is executed on a target system. The use of Zulip as a command-and-control channel represents a shift in tactics for OceanLotus, which has historically relied on more traditional infrastructure for its operations.
The specific motivation behind this campaign remains unclear. OceanLotus has been linked to state-sponsored espionage activities targeting government agencies, think tanks, and telecommunications firms in Southeast Asia and beyond. The group's operations often align with geopolitical interests, but no specific targets or objectives have been confirmed for this latest campaign.
Security experts warn that developers should exercise caution when installing packages from PyPI and verify the authenticity of libraries before integration into production environments. The incident highlights the growing risk of supply chain attacks, where malicious code is injected into trusted software repositories to compromise downstream systems.
As of Wednesday, the malicious packages had been removed from PyPI, but the extent of the compromise remains unknown. Researchers are continuing to analyze the malware to identify additional indicators of compromise and potential victims. The use of Zulip as an infrastructure component raises questions about the resilience of popular communication platforms against abuse by advanced threat actors.
The campaign underscores the evolving nature of cyber threats and the need for robust security practices in software development and deployment. Further investigation is required to determine the full scope of the attack and whether other repositories or platforms have been compromised in similar ways.