Malware & RansomwareHIGH

Trojanized PyPI AI Proxy Steals User Data Silently

Featured image for Trojanized PyPI AI Proxy Steals User Data Silently
#hermes-px#PyPI#Claude#data exfiltration#JFrog Security

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🎯

Basically, a fake AI tool stole users' data while pretending to keep it safe.

Quick Summary

A malicious Python package named hermes-px has been found on PyPI, masquerading as a privacy-focused AI tool. Developers are unknowingly at risk of data breaches, as the package exfiltrates sensitive information. Immediate action is required to mitigate potential damage.

What Happened

A new threat has emerged in the form of a malicious Python package named hermes-px. Disguised as a privacy-focused AI inference tool, this package was found on the Python Package Index (PyPI) and marketed itself as a Secure AI Inference Proxy. However, it was secretly designed to steal sensitive user data while users remained unaware.

How It Works

The package hijacked a private university's internal AI endpoint, capturing every message sent through it. Instead of protecting user anonymity, it exposed the real IP addresses of unsuspecting victims. The malicious package included extensive documentation, installation instructions, and a user-friendly interface, making it appear legitimate and trustworthy.

Who's Being Targeted

The primary targets of hermes-px are software developers working with AI models. Many developers searching for free, privacy-oriented alternatives to paid SDKs may have installed this package, believing it to be a safe option. Once integrated into their projects, all prompts sent through the package were logged without any visible signs of compromise.

Signs of Infection

If you have installed hermes-px, you should be concerned. The package not only collected user data but also had a feature that allowed attackers to execute additional malicious code remotely. This means that even if the package was updated, new threats could be introduced without users' knowledge.

How to Protect Yourself

If you suspect you have installed hermes-px, take immediate action:

  • Uninstall the package by running pip uninstall hermes-px.
  • Rotate any credentials, API keys, or sensitive data included in prompts sent through the package.
  • Treat every conversation passed through hermes-px as compromised and review it for sensitive information.
  • Block the attacker’s exfiltration endpoint at the network level.

Technical Details

At the heart of hermes-px was a compressed file containing a copy of Anthropic’s Claude Code system prompt. This prompt was modified but still contained identifiable markers linking it back to its original source. The attackers employed a sophisticated method of obfuscation, making it difficult for security tools to detect the threat. Sensitive data was encrypted and hidden in memory, complicating standard analysis techniques.

Conclusion

The discovery of hermes-px highlights the ongoing risks associated with third-party packages in the software development ecosystem. Developers must remain vigilant and conduct thorough checks on any packages they intend to use, especially those that promise enhanced privacy and security.

Pro Insight

🔒 Pro insight: The use of a legitimate-looking package to exfiltrate data underscores the need for rigorous vetting of third-party dependencies.

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings

HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Storm-1175 is exploiting web vulnerabilities for fast ransomware attacks. Healthcare and finance sectors are heavily impacted. Organizations must act quickly to patch vulnerabilities and secure their systems.

Microsoft Security Blog·
HIGHMalware & Ransomware

Malicious Strapi NPM Packages Target Guardarian Users

Hackers have targeted Strapi users with 36 malicious NPM packages. This attack aims to steal credentials and execute unauthorized commands. Guardarian users are especially at risk, prompting urgent security measures.

SecurityWeek·
HIGHMalware & Ransomware

ILSpy Domain Compromised - Malware Delivered to Developers

Hackers compromised the ILSpy WordPress domain, redirecting users to a malicious site. Developers are at risk of malware disguised as a browser extension. Stay vigilant and verify downloads!

Cyber Security News·
HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security Affairs·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security Affairs·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro Research·