SentinelOne SDK malvertised by Pypi Package
Researchers have discovered a new malicious package named SentinelOne on the PyPI repository impersonating a legitimate software development kit for SentinelOne.
The package is part of the malicious campaign called SentinelSneak. The package claims to provide access the SentinelOne’s APIs, but it contains malicious code to harvest sensitive info from development systems, including credentials, configuration data, and SSH keys.
As per researchers, the package is a replica of the actual SentinelOne SDK python client. The threat actor added the malicious functionality to its code. Threat actors behind the SentinelSneak campaign also released two additional packages, named SentinelOne-sdk and SentinelOneSDK, with similar functionalities.
The fake SentinelOne package contains api.py files that contain the code to steal and exfiltrate data, uploading it to the IP address 188.8.131.52.
The analysis of the changes between the versions of the malicious module revealed that threat actors modified it to improve the data collection algorithm and make it work on multiple platforms.
Threat actors published five additional malicious packages with a similar name, these modules did not contain api.py files with malicious functionality, a circumstance that suggests they were used for testing purposes.
The experts discovered that the malicious versions of the package have been downloaded over 1,000 times on PyPI.
The packages were published between December 8th and 11th, 2022. Findings were reported to the PyPI on December 15th, 2022, and SentinelOne was notified on December 16th, 2022.
This research was documented by researchers from ReversingLabs.
Indicators of Compromise