Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Detected in Hugging Face Repository with 200k Downloads

Malware Detected in Hugging Face Repository with 200k Downloads

Posted on May 11, 2026 By CWS

A widely used artificial intelligence repository on the Hugging Face platform has been discovered to contain malware, particularly targeting Windows operating systems. This repository, known as ‘Open-OSS/privacy-filter,’ was downloaded over 200,000 times before its removal by the platform’s security team.

Deceptive Appearance of the Malicious Package

The suspicious package was cleverly disguised as a legitimate privacy filtering tool, borrowing its model card directly from OpenAI’s Privacy Filter project. This misleading appearance led thousands of developers and researchers to download it, believing it to be a trustworthy AI utility.

Researchers from Hidden Layer were the first to identify the malicious code embedded within the repository. Their in-depth analysis uncovered a complex, multi-stage attack chain designed to covertly steal sensitive data from Windows devices while remaining undetected.

Stealthy Execution and Widespread Impact

The malware operated silently, executing in the background without alerting users. It employed a loader file that mimicked a legitimate AI model tool, commencing its harmful activities once activated on a Windows machine.

Before the repository was taken down, it had reached the top trending position on Hugging Face, with an estimated 244 downloads and 77 likes in under an hour. These figures were likely manipulated to boost the repository’s visibility and lure more victims.

Detailed Analysis of the Attack Chain

The attack unfolded over six stages. Initially, users were instructed to clone the repository and execute a ‘startbat’ file on Windows, or a ‘loaderpy’ script on Linux or macOS. On Windows, the ‘loaderpy’ script executed a decoy code, leading to a function that disabled SSL verification, decoded a URL, and fetched a JSON document to extract a command for PowerShell.

Subsequently, PowerShell downloaded a batch file from a domain imitating a blockchain analytics service. This file performed several actions, including admin checks and payload downloads. It also added exclusions to Microsoft Defender and created a scheduled task for persistence, which deleted itself after execution to avoid detection.

Final Payload and Security Recommendations

The final payload was a 10 MB Rust-based infostealer with capabilities to retrieve various types of sensitive information. It targeted browser cookies, saved passwords, SSH keys, VPN configurations, and more, sending the gathered data to a command-and-control server.

Hidden Layer’s telemetry linked the attacker to multiple similar repositories, indicating a broader supply chain attack on open-source AI platforms. Users who downloaded the affected repository are advised to isolate their systems, change stored credentials, and consider reimaging their machines before returning them to active use.

For comprehensive threat intelligence, review the Indicators of Compromise (IoCs) related to this incident. Follow security best practices to safeguard against future threats.

Cyber Security News Tags:AI repository, Cybersecurity, data breach, hidden layer, Hugging Face, InfoStealer, Malware, open source security, Open-OSS, Windows security

Post navigation

Previous Post: SailPoint’s GitHub Repositories Breached in Security Incident
Next Post: fsnotify Go Library Maintainer Changes Spark Security Concerns

Related Posts

0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets 0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
Microsoft Urges Action on Critical Windows Updates Microsoft Urges Action on Critical Windows Updates Cyber Security News
Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products Cyber Security News
Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data Cyber Security News
Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Cyber Security News
ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security
  • fsnotify Go Library Maintainer Changes Spark Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security
  • fsnotify Go Library Maintainer Changes Spark Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark