Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZiChatBot Malware Exploits Zulip APIs for Stealth Operations

ZiChatBot Malware Exploits Zulip APIs for Stealth Operations

Posted on May 8, 2026 By CWS

A newly identified cyber threat, ZiChatBot malware, is leveraging the REST APIs of Zulip, a legitimate team chat application, to covertly receive instructions from its operators. This innovative method avoids detection by bypassing private servers, which are typically flagged by security systems.

Uncovering the Threat

The discovery of ZiChatBot followed the identification of malicious Python packages on PyPI, a widely used Python Package Index, beginning in July 2025. These packages, disguised as common development tools, were uploaded to trick developers into installation. Once installed, they silently deployed the ZiChatBot payload without raising alerts.

Securelist analysts identified and named the malware after analyzing samples through their threat analysis pipeline. The analysis revealed that ZiChatBot targets both Windows and Linux systems, posing a cross-platform threat to developers globally. Notably, Kaspersky’s Threat Attribution Engine found a 64% code similarity between ZiChatBot and a previous dropper linked to the OceanLotus APT group.

Malware Tactics and Techniques

ZiChatBot employs Zulip’s public REST API for command and control, blending its malicious traffic with regular developer communications. The malware uses an API token embedded in HTTP requests for authentication, making its operations appear routine.

Operating within Zulip, ZiChatBot utilizes two channel-topic pairs: one for sending basic system data to attackers and another for executing shellcode commands. Post execution, the malware sends a heart emoji to indicate task completion, cleverly masquerading as normal activity.

On Windows, ZiChatBot is a DLL named libcef.dll, loaded by a legitimate executable, vcpktsvr.exe, to maintain persistence. In contrast, the Linux version resides at /tmp/obsHub/obs-check-update, using a crontab entry for continuous access.

Supply Chain Attack via PyPI

The attack initiated with three fake Python libraries uploaded to PyPI, resembling everyday development tools. The packages, uuid32-utils, colorinal, and termncolor, appeared benign but contained droppers for ZiChatBot installation during the library import process.

The termncolor package was particularly deceptive, listing the malicious colorinal package as a dependency, thus triggering the infection chain. The dropper used AES encryption to conceal sensitive data and self-deleted post-deployment, leaving minimal traces.

To mitigate risks, experts recommend adding helper.zulipchat.com to network denylists to detect any outgoing connections to the now-deactivated attacker infrastructure.

Indicators of compromise include specific malicious file names and hashes, detailed in the original report. Security professionals are advised to monitor these indicators within their networks.

For ongoing updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:API, APT32, cross-platform threat, Cybersecurity, Malware, OceanLotus, PyPI, supply chain attack, ZiChatBot, Zulip

Post navigation

Previous Post: Cybersecurity: Key Developments and Emerging Threats

Related Posts

NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine NestJS Framework Vulnerability Execute Arbitrary Code in Developers Machine Cyber Security News
Incident Response Planning – Preparing for Data Breaches Incident Response Planning – Preparing for Data Breaches Cyber Security News
Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users Cyber Security News
3 Key Benefits For SOCs And MSSPs  3 Key Benefits For SOCs And MSSPs  Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
Windows 11 Upgrade Issues Disrupt Network Access Windows 11 Upgrade Issues Disrupt Network Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats
  • Trellix Data Breach Exposes Source Code to RansomHouse
  • Cyberattack Disrupts Canvas Platform as Finals Near
  • Linux PamDOORa Backdoor Exploits PAM to Steal SSH Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats
  • Trellix Data Breach Exposes Source Code to RansomHouse
  • Cyberattack Disrupts Canvas Platform as Finals Near
  • Linux PamDOORa Backdoor Exploits PAM to Steal SSH Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark