Sliver pen-testing suite includes backdoors for Macs in PyPi package

A new package mimicked the popular 'requests' library on the Python Package Index (PyPI) to target macOS devices with the Sliver C2 adversary framework, used for gaining initial access to corporate networks. [...]

May 14, 2024 - 00:16
  Source
 0  8
Sliver pen-testing suite includes backdoors for Macs in PyPi package

A new package mimicked the popular 'requests' library on the Python Package Index (PyPI) to target macOS devices with the Sliver C2 adversary framework, used for gaining initial access to corporate networks. Discovered by Phylum, the campaign involves several steps and obfuscation layers, including using steganography in a PNG image file to covertly install the Sliver payload on the target.

As of writing this, the malicious PyPI package has been removed, but its discovery is another sign of Sliver's increased adoption of remote access to corporate networks. Sliver is a cross-platform open-source adversarial framework testing suite designed for "red team" operations, simulating adversary actions when testing network defenses. Its key features include custom implant generation, command and control (C2) capabilities, post-exploitation tools/scripts, and rich attack emulation options.

Hackers started using Sliver in 2022 primarily as an alternative to the commercial pen-testing framework Cobalt Strike, which has become easier to detect and block. Later that year, Sliver was seen targeting macOS devices by researchers at SentinelOne, who discovered the implant deployed in what appeared to be a fake VPN app. The adoption rate by cybercriminals continued to increase steadily in 2023 when Sliver was spotted in BYOVD attacks and ransomware operations. A cybersecurity advisory by CISA and the FBI from February 2024 highlighted Sliver's rising status as one of the common implants used by hackers who breach networks after exploiting Ivanti Connect Secure and Policy Secure Gateways.

In the latest attack seen by Phylum, the attack begins with a malicious Python package for macOS named 'requests-darwin-lite,' which is presented as a benign fork of the popular 'requests' library. The package, which is hosted on PyPI, contains Sliver's binary inside a 17MB PNG image file featuring the Requests logo. During installation on a macOS system, a PyInstall class executes to decode a base64-encoded string to run a command (ioreg) that retrieves the system's UUID (Universal Unique Identifier).

The UUID is used to validate that the package is being installed on the actual target, comparing it to a predefined UUID. When there's a match, the Go binary inside the PNG file is read and extracted from a specific portion at the file's offset. The Sliver binary is written to a local file with modified file permissions to make it executable and is eventually launched in the background. Following Phylum's report of requests-darwin-lite to the PyPI team, the package has been removed. The malicious versions were 2.27.1 and 2.27.2, while the subsequent 2.28.0 and 2.28.1 were missing the malicious modifications and installation hook.