Dormant Python Package Turns Malicious: The Case of django-log-tracker

, django-log-tracker malware

In a troubling development in the cybersecurity landscape, a dormant Python package on PyPI—django-log-tracker—resurfaced with a malicious payload. After two inactive years, the package recently unleashed the Nova Sentinel information stealer malware, taking developers and the software supply chain by surprise. Phylum, a renowned software supply chain security firm, caught wind of this anomalous update on February 21, 2024, promptly signaling a red flag over the sinister turn of events.

Remarkably, django-log-tracker had sat untouched since its original publication on PyPI in April 2022, with its associated GitHub repository frozen in time since April 10, 2022. This sudden and unsolicited update triggered alarms far and wide, as it indicated a probable compromise of the developer’s PyPI account—a narrative becoming all too familiar in the open-source ecosystem.

Until it was yanked down, django-log-tracker had been downloaded 3,866 times. Moreover, the rogue version, labeled 1.0.4, had successfully attracted 107 downloads on its release date alone. A detailed look at the package post-update revealed something stark: the original contents had nearly vanished. Only two files, “__init__.py” and “example.py,” remained, both playing crucial roles in the attack mechanism designed to wreak havoc.

The threat essentially involved downloading an executable, deceptively named “Updater_1.4.4_x64.exe,” from a suspect remote server. Python’s os.startfile() function then became the catalyst, launching the malware onto the unsuspecting user’s system. This binary, once initiated, sheltered the sinister Nova Sentinel—a stealer malware initially identified by Sekoia in November 2023 lurking within fake Electron apps.

The malicious executable harbored advanced capabilities. It could pilfer browser secrets, crypto-wallet credentials, and even implement a clipboard hijacker—complete with a list of wallet addresses possibly earmarked to avoid certain sources. Investigations around this malware have made unsettling discoveries, with active transactions traced back to these addresses in both Ethereum and Bitcoin.

This supply-chain attack, enabled by a compromised PyPI account, serves as a stark reminder of the acute dangers posed by the jeopardized open-source ecosystem. Developers and organizations everywhere must exercise heightened vigilance, especially when dealing with third-party dependencies that might lack stringent version specifications.

For more in-depth analysis on this incident, eager readers can peruse the informative piece furnished by Phylum available through this [external source](https://blog.phylum.io/dormant-pypi-package-updated-to-deploy-novasentinel-stealer/). And for those interested in the technical nitty-gritty of the compromised package, the original [GitHub repository](https://github.com/Ragib01/django_log_tracker) and statistics on [django-log-tracker downloads](https://www.pepy.tech/projects/django-log-tracker) offer a wealth of data.

As the dust settles and the cybersecurity community grapples with the implications of this breach, one thing remains crystal clear: in the era of interconnected software, cyber vigilance is not just advisable—it is imperative.

If you enjoyed this article, please check out our other articles on CyberNow

February 24, 2024
A Python package, django-log-tracker, reactivated with a malware payload after two years, signaling supply chain risks.