Skip to content
Tech News
← Back to articles

Fake OpenAI repository on Hugging Face pushes infostealer malware

read original get Cybersecurity Awareness Poster → more articles
Why This Matters

A malicious repository impersonating OpenAI’s Privacy Filter on Hugging Face successfully distributed infostealer malware to Windows users, highlighting the risks of impersonation and malicious AI model sharing on open platforms. This incident underscores the importance of vigilance and security measures in the AI and ML community to protect sensitive data from cyber threats.

Key Takeaways

A malicious Hugging Face repository that reached the platform’s trending list impersonated OpenAI’s “Privacy Filter” project to deliver information-stealing malware to Windows users.

The repository briefly reached #1 on Hugging Face and accumulated 244,000 downloads before the platform responded to reports and removed it.

The Hugging Face platform lets developers and researchers share AI models, datasets, and machine learning (ML) tools. Models are pre-trained AI systems hosted on the platform comprising weight files, configuration, and code.

Researchers at HiddenLayer, a company focused on safeguarding AI and ML models against attacks, discovered the campaign on May 7, after noticing a malicious repository named Open-OSS/privacy-filter.

“The repository had typosquatted OpenAI's legitimate Privacy Filter release, copied its model card nearly verbatim, and shipped a loader.py file that fetches and executes infostealer malware on Windows machines,” the researchers explain.

Instructions from the malicious repository

Source: HiddenLayer

The ‘loader.py’ Python script included fake AI-related code to appear harmless, but in the background, it disabled SSL verification, decoded a base64 URL pointing to an external resource, and then fetched and executed a JSON payload containing a PowerShell command.

The command, which is executed in an invisible window, downloads a batch file (start.bat) that performs privilege escalation, downloads the final payload (sefirah), adds it to Microsoft Defender's exclusions for it, and executes it.

The final payload is a Rust-based infostealer that targets the following sensitive data:

... continue reading