ZiChatBot PyPI malware that uses Zulip as C2 and breaks the security of supply chain

Published 3 min de lectura 64 reading

Cybersecurity researchers have detected a PyPI supply chain campaign that distributed a new malware, called ZiChatBot, through three packages that seemed legitimate but hidden a malicious delivery mechanism. The most striking technical innovation is the use of public APIs of a team chat application as command and control infrastructure (C2), instead of traditional C2 servers, which makes it difficult to detect for suspicious traffic to private domains.

The packages, which were already removed from PyPI after the report, were uploaded in a short window in July 2025 and together had thousands of downloads. His behavior shows an increasingly common tactic: small projects with seemingly harmless features that serve as a gateway for native droppers in Windows and Linux. On the Windows platform the payload places and load a DLL called "terminate.dll," creates persistence in the record and tries to delete evidence; in Linux the equivalent is "terminate.so" planted in "/ tmp / obsHub / obs-check-update" with a crontab entry for persistence. The malware runs shellcode received by REST and confirms the execution with a heart emoji towards its C2 in Zulip.

ZiChatBot PyPI malware that uses Zulip as C2 and breaks the security of supply chain
Image generated with IA.

Beyond how ZiChatBot works, the episode has strategic implications: the use of legitimate services (such as Zulip or, in previous campaigns attributed to similar groups, Notion) as a control channel complicates the response, because traffic seems normal and public suppliers are not designed to act as threat infrastructure. This increases the risk for development and deployment environments that accept external units without strong controls especially when these units contain binary components or compiled wheels.

The attribution is not confirmed, although analysts mentioned similarities with a dropper used by the actor known as OceanLotus (APT32). If confirmed, it would be consistent with the group's tendency to diversify vectors beyond traditional phishing and to use supply chain techniques to scale its scope. Whoever the author is, the vector is relevant: attackers are perfecting the abuse of public repositories.

For developers and security equipment this means adjusting both processes and technical controls. Practical recommendations include auditing dependencies before integrating them into productive projects, distrusting new packages with few downloads that declare unexpected dependencies, and reviewing the presence of native binaries or wheels within packages. Unit audit tools such as pip-audit help identify known vulnerabilities, and the PyPI security page offers guidelines and reporting mechanisms that you should know: https: / / pypi.org / security /.

ZiChatBot PyPI malware that uses Zulip as C2 and breaks the security of supply chain
Image generated with IA.

From an operational perspective, there are concrete detection and recovery actions: search and remove indicator files such as "terminate.dll" and "terminate.so," review Autostart entries in the Windows Registry and chronJobs on Linux servers, and monitor outgoing connections to Zulip APIs or other third-party services. It is also prudent to generate an SBOM for critical environments, to force human review of changes in CI / CD units, and to implement policies to restrict the execution of unsigned binaries.

Organizations should also strengthen their package governance strategy: require signatures and 2FA to critical package owners, limit installation permits in sensitive environments and apply strong isolation in development environments so that an accidental installation does not compromise production infrastructure. Software supply chain security best practice resources can be found in the CISA supply chain guide: https: / / www.cisa.gov / supply-chain.

Finally, open source project managers and repository managers must activate review mechanisms and alerts to native-code packages or unusual behaviors. The key lesson is that the security of the supply chain requires continuous surveillance: attackers migrate quickly to vectors that amplify impact and camouflage malicious traffic within legitimate services. Implementing preventive controls and early detection capabilities is now more critical than ever.

Coverage

Related

More news on the same subject.