Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Detected in Hugging Face Repository with 200k Downloads

Malware Detected in Hugging Face Repository with 200k Downloads

Posted on May 11, 2026 By CWS

A widely used artificial intelligence repository on the Hugging Face platform has been discovered to contain malware, particularly targeting Windows operating systems. This repository, known as ‘Open-OSS/privacy-filter,’ was downloaded over 200,000 times before its removal by the platform’s security team.

Deceptive Appearance of the Malicious Package

The suspicious package was cleverly disguised as a legitimate privacy filtering tool, borrowing its model card directly from OpenAI’s Privacy Filter project. This misleading appearance led thousands of developers and researchers to download it, believing it to be a trustworthy AI utility.

Researchers from Hidden Layer were the first to identify the malicious code embedded within the repository. Their in-depth analysis uncovered a complex, multi-stage attack chain designed to covertly steal sensitive data from Windows devices while remaining undetected.

Stealthy Execution and Widespread Impact

The malware operated silently, executing in the background without alerting users. It employed a loader file that mimicked a legitimate AI model tool, commencing its harmful activities once activated on a Windows machine.

Before the repository was taken down, it had reached the top trending position on Hugging Face, with an estimated 244 downloads and 77 likes in under an hour. These figures were likely manipulated to boost the repository’s visibility and lure more victims.

Detailed Analysis of the Attack Chain

The attack unfolded over six stages. Initially, users were instructed to clone the repository and execute a ‘startbat’ file on Windows, or a ‘loaderpy’ script on Linux or macOS. On Windows, the ‘loaderpy’ script executed a decoy code, leading to a function that disabled SSL verification, decoded a URL, and fetched a JSON document to extract a command for PowerShell.

Subsequently, PowerShell downloaded a batch file from a domain imitating a blockchain analytics service. This file performed several actions, including admin checks and payload downloads. It also added exclusions to Microsoft Defender and created a scheduled task for persistence, which deleted itself after execution to avoid detection.

Final Payload and Security Recommendations

The final payload was a 10 MB Rust-based infostealer with capabilities to retrieve various types of sensitive information. It targeted browser cookies, saved passwords, SSH keys, VPN configurations, and more, sending the gathered data to a command-and-control server.

Hidden Layer’s telemetry linked the attacker to multiple similar repositories, indicating a broader supply chain attack on open-source AI platforms. Users who downloaded the affected repository are advised to isolate their systems, change stored credentials, and consider reimaging their machines before returning them to active use.

For comprehensive threat intelligence, review the Indicators of Compromise (IoCs) related to this incident. Follow security best practices to safeguard against future threats.

Cyber Security News Tags:AI repository, Cybersecurity, data breach, hidden layer, Hugging Face, InfoStealer, Malware, open source security, Open-OSS, Windows security

Post navigation

Previous Post: SailPoint’s GitHub Repositories Breached in Security Incident
Next Post: fsnotify Go Library Maintainer Changes Spark Security Concerns

Related Posts

GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware Cyber Security News
Critical Apache Syncope Vulnerability Exposes User Sessions Critical Apache Syncope Vulnerability Exposes User Sessions Cyber Security News
New Fully Undetectable FUD Android RAT Hosted on GitHub New Fully Undetectable FUD Android RAT Hosted on GitHub Cyber Security News
Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions Cyber Security News
Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User Cyber Security News
Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution Critical Nessus Agent Flaw on Windows Allows System-Level Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security
  • fsnotify Go Library Maintainer Changes Spark Security Concerns
  • Malware Detected in Hugging Face Repository with 200k Downloads
  • SailPoint’s GitHub Repositories Breached in Security Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security
  • fsnotify Go Library Maintainer Changes Spark Security Concerns
  • Malware Detected in Hugging Face Repository with 200k Downloads
  • SailPoint’s GitHub Repositories Breached in Security Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark