A malicious software package posing as the legitimate VMware vSphere connector module ‘vConnector’ has been found on the Python Package Index (PyPI), targeting IT professionals. This fraudulent package, named ‘VMConnect,’ was intended to deceive developers and system administrators who frequently rely on VMware vSphere tools.
Sonatype’s research, along with BleepingComputer’s Ax Sharma, uncovered that the malicious package was uploaded to PyPI on July 28, 2023, and managed to amass 237 downloads before being removed on August 1, 2023.
In a disturbing revelation, Sonatype’s investigation unveiled two additional packages, ‘ethter’ and ‘quantiumbase,’ sharing identical code with ‘VMConnect.’ These fake packages imitate legitimate software tools like ‘eth-tester’ and ‘databases,’ aiming to exploit over 70,000 and 360,000 monthly downloads, respectively. All three malicious packages function similarly to their legitimate counterparts, potentially luring victims into a false sense of security and extending the duration of an infection.
The malicious intent behind these packages becomes evident in the ‘init.py’ file, where encoded strings execute on compromised machines to retrieve and execute data from an attacker-controlled URL. Despite appearing as image links, these URLs contain plaintext code.
While Sonatype’s Ankita Lamba led the investigation, the second-stage payload couldn’t be retrieved due to its removal from the external source during the inquiry. This covert operation of external URL access strongly indicates a high-risk endeavor, even if the specific actions remain undisclosed.
Notably, the packages’ author, registered as “hushki502” on both PyPI and GitHub, did not respond to Sonatype’s attempts to contact them. The appearance of accuracy and realism in the phony packages’ descriptions, along with matching GitHub repositories, highlights the level of deception employed.
Developers are cautioned to remain vigilant and watch for indicators such as short histories, low download counts, hidden code, and package names resembling legitimate projects to prevent falling victim to such sophisticated attacks.