Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers

May 15, 2026

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

May 15, 2026

China-Linked Hackers Deploy New TencShell Malware Against Manufacturer

May 15, 2026
Facebook X (Twitter) Instagram
Friday, May 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux
News

PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux

Team-CWDBy Team-CWDMay 15, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver a previously unknown malware family called ZiChatBot on Windows and Linux systems.

“While these wheel packages do implement the features described on their PyPI web pages, their true purpose is to covertly deliver malicious files,” Kaspersky said. “Unlike traditional malware, ZiChatBot does not communicate with a dedicated command-and-control (C2) server, but instead uses a series of REST APIs from the public team chat app Zulip as its C2 infrastructure.”

The activity has been described as a “carefully planned and executed PyPI supply chain attack” by the Russian cybersecurity company. The names of the packages, which have since been taken down, are listed below –

  • uuid32-utils (1,479 downloads)
  • colorinal (614 downloads)
  • termncolor (387 downloads)

All three packages were uploaded to PyPI during a short window between July 16 and 22, 2025. While uuid32-utils and colorinal make use of similar malicious payloads, termncolor is a benign-looking package that lists colorinal as a dependency.

On Windows systems, once any of the first two packages is installed, the malicious code extracts a DLL dropper (“terminate.dll”) and write it to disk. At the time the library is imported into a project, the DLL is loaded, acting as a dropper for ZiChatBot, after which it establishes an auto-run entry in the Windows Registry, and runs code to delete itself from the host.

The Linux version of the shared object dropper (“terminate.so”) plants the malware in the “/tmp/obsHub/obs-check-update” path and configures a crontab entry. Regardless of the operating system it’s running on, ZiChatBot is designed to execute shellcode received from its C2 server. After executing the command, the malware sends a heart emoji as a response to signal the server that the operation was successful.

Exactly who is behind the campaign is not clear. However, Kaspersky said the dropper shares a “64% similarity” to another dropper used by a Vietnam-aligned hacking group named OceanLotus (aka APT32).

In late 2024, the threat actor was observed targeting the Chinese cybersecurity community with poisoned Visual Studio Code projects masquerading as Cobalt Strike plugins to deliver a trojan that’s executed automatically when the project is compiled. The malware uses the Notion note-taking service as C2, per an analysis from ThreatBook.

Kaspersky pointed out that if the PyPI supply chain campaign is indeed the work of OceanLotus, it represents the threat actor’s strategy to expand its targeting scope.

“Although phishing emails are still a common initial infection method for OceanLotus, the group is also actively exploring new ways to compromise victims through diverse supply chain attacks,” it said.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChina-Linked Hackers Deploy New TencShell Malware Against Manufacturer
Next Article Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers
Team-CWD
  • Website

Related Posts

News

Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers

May 15, 2026
News

China-Linked Hackers Deploy New TencShell Malware Against Manufacturer

May 15, 2026
News

Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Can password managers get hacked? Here’s what to know

November 14, 2025

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.