Three PyPI Packages Caught Stealthily Deploying ZiChatBot Malware on Windows and Linux Systems
Security researchers at Kaspersky have uncovered a supply-chain threat targeting developers on PyPI, the dominant Python package repository. Three malicious packages were found implementing their advertised functionality while simultaneously delivering a previously undocumented malware family dubbed ZiChatBot, capable of striking both Windows and Linux environments.
The packages, distributed as wheel files (.whl), leveraged Zulip API integrations to establish covert command-and-control channels. According to the researchers, the wheel packages genuinely performed the features described on their PyPI listing pages, a deliberate tactic to evade detection and build user trust over time. This dual-purpose design allowed the malware to operate under the radar while developers believed they were installing legitimate tooling. The use of Zulip—a lesser-monitored communication API—further complicated forensic analysis and threat attribution.
The discovery highlights persistent vulnerabilities in open-source package ecosystems, where attackers exploit the high trust placed in community-contributed libraries. PyPI has faced recurring abuse campaigns, but the sophistication of ZiChatBot's deployment mechanism signals escalating tactics among threat actors targeting software supply chains. Developers who installed these packages on Windows or Linux systems may have unknowingly exposed credentials, lateral movement pathways, or persistent backdoor access. Security teams are advised to audit recent Python installations and verify package authenticity through hash verification and dependency inspection.