Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

PyPI package delivers ZiChatBot malware via Zulip API on Windows and Linux

University of Southern California researchers secure $10 million grant from NIH to investigate health effects of PFAS

How to reap the benefits of AI as security risks increase

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » PyPI package delivers ZiChatBot malware via Zulip API on Windows and Linux
Identity

PyPI package delivers ZiChatBot malware via Zulip API on Windows and Linux

By May 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 7, 2026Malware/Threat Intelligence

Cybersecurity researchers have discovered three packages in the Python Package Index (PyPI) repository designed to covertly deliver a previously unknown malware family called ZiChatBot to Windows and Linux systems.

“While these wheel packages implement the functionality described on the PyPI web page, their true purpose is to covertly deliver malicious files,” Kaspersky said. “Unlike traditional malware, ZiChatBot does not communicate with a dedicated command and control (C2) server, but instead uses the public team chat app Zulip’s set of REST APIs as its C2 infrastructure.”

The activity has been described by the Russian cybersecurity firm as a “carefully planned and executed PyPI supply chain attack.” The names of packages that have since been removed are listed below.

uuid32-utils (1,479 downloads) colorinal (614 downloads) termncolor (387 downloads)

All three packages were uploaded to PyPI during a short period of time from July 16th to 22nd, 2025. uuid32-utils and colorinal utilize similar malicious payloads, but termncolor is a benign-looking package that lists colorinal as a dependency.

On Windows systems, when one of the first two packages is installed, the malicious code extracts a DLL dropper (‘terminate.dll’) and writes it to disk. When the library is imported into your project, the DLL is loaded and acts as a dropper for ZiChatBot. It then establishes an autorun entry in the Windows registry and executes code that removes itself from the host.

The Linux version of the shared object dropper (‘terminate.so’) plants malware in the ‘/tmp/obsHub/obs-check-update’ path and configures the crontab entry. Regardless of the operating system it is running on, ZiChatBot is designed to execute shellcode received from the C2 server. After executing the command, the malware sends a heart emoji in response to inform the server that the operation was successful.

It’s not exactly clear who is behind this campaign. However, Kaspersky said the dropper shares “64% similarity” with another dropper used by a Vietnamese hacker group named OceanLotus (also known as APT32).

In late 2024, threat actors were observed targeting the Chinese cybersecurity community using poisoned Visual Studio Code projects disguised as the Cobalt Strike plugin and delivering a Trojan that was automatically executed when the project was compiled. According to ThreatBook analysis, the malware uses the Notion note-taking service as its C2.

Kaspersky noted that if the PyPI supply chain campaign is indeed the work of OceanLotus, it represents the threat actor’s strategy to expand its targeting reach.

“While phishing emails remain a common initial infection method for OceanLotus, the group is also actively exploring new ways to compromise victims through a variety of supply chain attacks,” the group said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUniversity of Southern California researchers secure $10 million grant from NIH to investigate health effects of PFAS

Related Posts

Vulnerability in vm2 Node.js library allows sandbox escape and arbitrary code execution

May 7, 2026

Mirai-based xlabs_v1 botnet exploits ADB to hijack IoT devices and launch DDoS attacks

May 6, 2026

MuddyWater uses Microsoft Teams to steal credentials in false flag ransomware attack

May 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

PyPI package delivers ZiChatBot malware via Zulip API on Windows and Linux

University of Southern California researchers secure $10 million grant from NIH to investigate health effects of PFAS

How to reap the benefits of AI as security risks increase

How RSS-Hydro uses AI to predict weather impacts

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.