By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Infostealer on AI platform Hugging Face disguises itself as an OpenAI repository
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Software > Infostealer on AI platform Hugging Face disguises itself as an OpenAI repository
Software

Infostealer on AI platform Hugging Face disguises itself as an OpenAI repository

News Room
Last updated: 2026/05/12 at 4:29 AM
News Room Published 12 May 2026
Share
Infostealer on AI platform Hugging Face disguises itself as an OpenAI repository
SHARE

  1. Infostealer on AI platform Hugging Face disguises itself as an OpenAI repository

At the beginning of May, a repository appeared on Hugging Face that disguised itself as an OpenAI model and installed an infostealer on Windows systems. The attackers used typosquatting and distributed the repository as an Open-OSS/privacy-filter based on the OpenAI model openai/privacy-filter.

Read more after the ad

During the attack, the repository landed at #1 trending repository within 18 hours, with over 240,000 downloads and 667 likes. The latter largely relied on automated accounts to push the repository.

Hugging Face has since removed the repository. Anyone who previously cloned it on a Windows computer and ran either start.bat or loader.py should consider their system to be infected and credentials stored in browsers and their extensions to be potentially hacked.

The analysis by the AI ​​security company HiddenLayer shows which files can be affected.

At first glance, almost identical to the OpenAI repository

Apparently the attackers copied the model card that describes the model almost verbatim from OpenAI’s privacy filter, including a link to a PDF from OpenAI.

The instructions in the Readme were also largely similar, but also asked to clone the repository locally and run start.bat on Windows and the Python loader loader.py on macOS or Linux.

Pretend model activity

Read more after the ad

As a distraction, the loader initially runs seemingly legitimate code with a class DummyModelmock model training output and a synthetic data set.

The installation of the malicious code starts with the function called at the end _verify_checksum_integrity(). It starts a PowerShell command that only works on Windows systems and runs hidden in the background

powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -Command 

With the Creation Flag CREATE_NO_WINDOW the process runs without a console window.

Numerous obfuscation tactics

The script downloads and executes an update.bat file that prepares the actual malicious code infection. To do this, the file first checks for admin rights, which it requests in case of doubt, which at least triggers a UAC prompt. She then downloads the malicious code and tries to enter it as an exception for Microsoft Defender.

The actual infostealer is a program written in Rust that uses numerous obfuscation techniques to avoid being recognized as malicious code. Among other things, the program obfuscates the use of Windows APIs and checks whether an anti-malware program is running it in a virtual machine.

Collect and upload

Finally, the Infostealer collects information from browsers, Discord, wallets (including via browser extensions), various configuration files and geodata. It also creates screenshots using the Windows Graphics Device Interface (gdi32.dll).

The infostealer packs the collected data into a JSON file, which it uploads to a remote server.

Automated likes for better visibility

The likes were probably created largely automatically in order to push the repository. According to HiddenLayer’s analysis, 504 follow the pattern “firstname-lastname###” and another 153 follow the pattern “adjectivenoun####”.

A portion of the 244,000 downloads were probably not carried out automatically by victims of the Infostealer attack, but rather by the attackers themselves in order to drive the repository up in the Hugging Face ranking.


(rme)



Unfortunately, this link is no longer valid.

Links to gifted items will be invalid if they are older than 7 days or have been accessed too often.


You need a heise+ package to read this article. Try it now for a week without obligation – without obligation!

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article after 16 road accidents, this Tesla competitor is the target of an investigation after 16 road accidents, this Tesla competitor is the target of an investigation
Next Article This column is too dangerous to read This column is too dangerous to read
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

This column is too dangerous to read
This column is too dangerous to read
News
after 16 road accidents, this Tesla competitor is the target of an investigation
after 16 road accidents, this Tesla competitor is the target of an investigation
Mobile
end-to-end encryption between iPhone and Android with iOS 26.5
end-to-end encryption between iPhone and Android with iOS 26.5
Computing
Thinking Machines Labs is working on an AI that can interrupt you: Why it’s so special
Thinking Machines Labs is working on an AI that can interrupt you: Why it’s so special
Gadget

You Might also Like

Supply chains in the spotlight: Shein and Temu litigation
Software

Supply chains in the spotlight: Shein and Temu litigation

4 Min Read
Swiss health data: Confederates against US cloud dominance
Software

Swiss health data: Confederates against US cloud dominance

4 Min Read
RCS catches up with iMessage: Apple provides iOS 26.5
Software

RCS catches up with iMessage: Apple provides iOS 26.5

4 Min Read
Rheinmetall and Telekom are developing an anti-drone defense shield
Software

Rheinmetall and Telekom are developing an anti-drone defense shield

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?