<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gecko — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gecko/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 09 May 2026 14:26:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gecko/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious Hugging Face Repository Distributes Information Stealer</title><link>https://feed.craftedsignal.io/briefs/2026-05-huggingface-infostealer/</link><pubDate>Sat, 09 May 2026 14:26:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-huggingface-infostealer/</guid><description>A malicious repository on Hugging Face, impersonating OpenAI's 'Privacy Filter' project, distributed information-stealing malware to Windows users by executing a PowerShell command that downloads and runs a Rust-based infostealer, which exfiltrates collected data to a command-and-control server.</description><content:encoded><![CDATA[<p>On May 7, 2026, HiddenLayer researchers discovered a malicious repository on Hugging Face named Open-OSS/privacy-filter that impersonated OpenAI&rsquo;s legitimate &ldquo;Privacy Filter&rdquo; project. The repository briefly reached the #1 trending spot on Hugging Face and accumulated 244,000 downloads before being removed. The malicious repository contained a &rsquo;loader.py&rsquo; file that, when executed on Windows machines, fetches and executes information-stealing malware. The malware employs anti-analysis techniques to evade detection. This incident highlights the risk of supply chain attacks targeting AI/ML platforms and the potential for widespread distribution of malware through trusted repositories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user downloads a malicious repository from Hugging Face impersonating OpenAI&rsquo;s &ldquo;Privacy Filter&rdquo; project.</li>
<li>The user executes the <code>loader.py</code> Python script within the downloaded repository.</li>
<li><code>loader.py</code> disables SSL verification and decodes a base64 URL, fetching a JSON payload containing a PowerShell command from an external resource.</li>
<li>The PowerShell command is executed in an invisible window.</li>
<li>The PowerShell command downloads a batch file (<code>start.bat</code>).</li>
<li><code>start.bat</code> performs privilege escalation.</li>
<li><code>start.bat</code> downloads the final payload (sefirah) and adds it to Microsoft Defender&rsquo;s exclusions.</li>
<li><code>start.bat</code> executes the final payload, a Rust-based information stealer, which collects and exfiltrates sensitive data to recargapopular[.]com.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The exact number of victims is unclear, but the malicious repository accumulated 244,000 downloads. Successful execution of the malware results in the theft of browser data (cookies, saved passwords, encryption keys, browsing data, session tokens), Discord tokens and master keys, cryptocurrency wallets and browser extensions, SSH/FTP/VPN credentials, sensitive local files, system information, and multi-monitor screenshots. The stolen data is then exfiltrated to the attacker&rsquo;s command-and-control server, potentially leading to financial loss, identity theft, and further compromise of affected systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the following Sigma rule to detect the execution of the malicious <code>loader.py</code> script that downloads the batch file (start.bat).</li>
<li>Block the C2 domain <code>recargapopular[.]com</code> listed in the IOC table at the DNS resolver to prevent data exfiltration.</li>
<li>Enable Sysmon process creation logging to capture the PowerShell command execution initiated by the Python script, allowing for further investigation (see Sigma rules below).</li>
<li>Educate users to verify the authenticity of repositories and files downloaded from Hugging Face and other similar platforms.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>huggingface</category><category>infostealer</category><category>malware</category><category>supply-chain</category><category>python</category><category>powershell</category><category>windows</category></item></channel></rss>