Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZiChatBot Malware Exploits Zulip APIs for Stealth Operations

ZiChatBot Malware Exploits Zulip APIs for Stealth Operations

Posted on May 8, 2026 By CWS

A newly identified cyber threat, ZiChatBot malware, is leveraging the REST APIs of Zulip, a legitimate team chat application, to covertly receive instructions from its operators. This innovative method avoids detection by bypassing private servers, which are typically flagged by security systems.

Uncovering the Threat

The discovery of ZiChatBot followed the identification of malicious Python packages on PyPI, a widely used Python Package Index, beginning in July 2025. These packages, disguised as common development tools, were uploaded to trick developers into installation. Once installed, they silently deployed the ZiChatBot payload without raising alerts.

Securelist analysts identified and named the malware after analyzing samples through their threat analysis pipeline. The analysis revealed that ZiChatBot targets both Windows and Linux systems, posing a cross-platform threat to developers globally. Notably, Kaspersky’s Threat Attribution Engine found a 64% code similarity between ZiChatBot and a previous dropper linked to the OceanLotus APT group.

Malware Tactics and Techniques

ZiChatBot employs Zulip’s public REST API for command and control, blending its malicious traffic with regular developer communications. The malware uses an API token embedded in HTTP requests for authentication, making its operations appear routine.

Operating within Zulip, ZiChatBot utilizes two channel-topic pairs: one for sending basic system data to attackers and another for executing shellcode commands. Post execution, the malware sends a heart emoji to indicate task completion, cleverly masquerading as normal activity.

On Windows, ZiChatBot is a DLL named libcef.dll, loaded by a legitimate executable, vcpktsvr.exe, to maintain persistence. In contrast, the Linux version resides at /tmp/obsHub/obs-check-update, using a crontab entry for continuous access.

Supply Chain Attack via PyPI

The attack initiated with three fake Python libraries uploaded to PyPI, resembling everyday development tools. The packages, uuid32-utils, colorinal, and termncolor, appeared benign but contained droppers for ZiChatBot installation during the library import process.

The termncolor package was particularly deceptive, listing the malicious colorinal package as a dependency, thus triggering the infection chain. The dropper used AES encryption to conceal sensitive data and self-deleted post-deployment, leaving minimal traces.

To mitigate risks, experts recommend adding helper.zulipchat.com to network denylists to detect any outgoing connections to the now-deactivated attacker infrastructure.

Indicators of compromise include specific malicious file names and hashes, detailed in the original report. Security professionals are advised to monitor these indicators within their networks.

For ongoing updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:API, APT32, cross-platform threat, Cybersecurity, Malware, OceanLotus, PyPI, supply chain attack, ZiChatBot, Zulip

Post navigation

Previous Post: Cybersecurity: Key Developments and Emerging Threats
Next Post: Malware Abuses AI Platforms Hugging Face and ClawHub

Related Posts

Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations Threats Actors Weaponize ScreenConnect Installers to Gain Initial Access to Organizations Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News
Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Cyber Security News
Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan Cyber Security News
ClickFix Attack Evolves: New Tactics Bypass Detection ClickFix Attack Evolves: New Tactics Bypass Detection Cyber Security News
CISA Alerts on Critical Ivanti EPMM Vulnerability CISA Alerts on Critical Ivanti EPMM Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malware Abuses AI Platforms Hugging Face and ClawHub
  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats
  • Trellix Data Breach Exposes Source Code to RansomHouse
  • Cyberattack Disrupts Canvas Platform as Finals Near

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malware Abuses AI Platforms Hugging Face and ClawHub
  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats
  • Trellix Data Breach Exposes Source Code to RansomHouse
  • Cyberattack Disrupts Canvas Platform as Finals Near

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark