By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers
Computing

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers

News Room
Last updated: 2025/09/18 at 8:51 AM
News Room Published 18 September 2025
Share
SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers
SHARE

Sep 18, 2025Ravie LakshmananMalware / Supply Chain Attack

Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository that are designed to deliver a remote access trojan called SilentSync on Windows systems.

“SilentSync is capable of remote command execution, file exfiltration, and screen capturing,” Zscaler ThreatLabz’s Manisha Ramcharan Prajapati and Satyam Singh said. “SilentSync also extracts web browser data, including credentials, history, autofill data, and cookies from web browsers like Chrome, Brave, Edge, and Firefox.”

The packages, now no longer available for download from PyPI, are listed below. They were both uploaded by a user named “CondeTGAPIS.”

  • sisaws (201 Downloads)
  • secmeasure (627 Downloads)
Audit and Beyond

Zscaler said the package sisaws mimics the behavior of the legitimate Python package sisa, which is associated with Argentina’s national health information system, Sistema Integrado de Información Sanitaria Argentino (SISA).

However, present in the library is a function called “gen_token()” in the initialization script (__init__.py) that acts as a downloader for a next-stage malware. To achieve this, it sends a hard-coded token as input, and receives as response a secondary static token in a manner that’s similar to the legitimate SISA API.

“If a developer imports the sisaws package and invokes the gen_token function, the code will decode a hexadecimal string that reveals a curl command, which is then used to fetch an additional Python script,” Zscaler said. “The Python script retrieved from PasteBin is written to the filename helper.py in a temporary directory and executed.”

Secmeasure, in a similar fashion, masquerades as a “library for cleaning strings and applying security measures,” but harbors embedded functionality to drop SilentSync RAT.

SilentSync is mainly geared towards infecting Windows systems at this stage, but the malware is also equipped with built-in features for Linux and macOS as well, making Registry modifications on Windows, altering the crontab file on Linux to execute the payload on system startup, and registering a LaunchAgent on macOS.

The package relies on the secondary token’s presence to send an HTTP GET request to a hard-coded endpoint (“200.58.107[.]25”) in order to receive Python code that’s directly executed in memory. The server supports four different endpoints –

  • /checkin, to verify connectivity
  • /comando, to request commands to execute
  • /respuesta, to send a status message
  • /archivo, to send command output or stolen data
CIS Build Kits

The malware is capable of harvesting browser data, executing shell commands, capturing screenshots, and stealing files. It can also exfiltrate files and entire directories in the form of ZIP archives. Once the data is transmitted, all the artifacts are deleted from the host to sidestep detection efforts.

“The discovery of the malicious PyPI packages sisaws and secmeasure highlight the growing risk of supply chain attacks within public software repositories,” Zscaler said. “By leveraging typosquatting and impersonating legitimate packages, threat actors can gain access to personally identifiable information (PII).”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Don’t waste money on gold-plated HDMI cables – buy this instead Don’t waste money on gold-plated HDMI cables – buy this instead
Next Article Be Smart and Back Up Your iPhone to Save Your Digital Life Be Smart and Back Up Your iPhone to Save Your Digital Life
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Chris McCausland: Seeing into the Future – an astonishing look at how tech is changing disabled people’s lives
Chris McCausland: Seeing into the Future – an astonishing look at how tech is changing disabled people’s lives
News
Apple’s M4 Mac Mini Is Small, Mighty and Under 0 This Black Friday
Apple’s M4 Mac Mini Is Small, Mighty and Under $500 This Black Friday
News
How to Share Influencer Posts as Branded Content Ads on Instagram
How to Share Influencer Posts as Branded Content Ads on Instagram
Computing
SpaceX’s Starship Suffers Major Test Mishap a Day After Blue Origin Unveils Rocket Upgrade Plans
SpaceX’s Starship Suffers Major Test Mishap a Day After Blue Origin Unveils Rocket Upgrade Plans
News

You Might also Like

How to Share Influencer Posts as Branded Content Ads on Instagram
Computing

How to Share Influencer Posts as Branded Content Ads on Instagram

9 Min Read
Black Myth: Wukong breaks record with  million in presales, achieves 1.3 million concurrent players on Steam · TechNode
Computing

Black Myth: Wukong breaks record with $53 million in presales, achieves 1.3 million concurrent players on Steam · TechNode

1 Min Read
How to Get on the Instagram Explore Page in 2025
Computing

How to Get on the Instagram Explore Page in 2025

13 Min Read
Former OpenAI executive Zack Kass on rediscovering what it means to be human in the age of AI · TechNode
Computing

Former OpenAI executive Zack Kass on rediscovering what it means to be human in the age of AI · TechNode

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?