Social Media

This Popular TikTok Trend is Spreading Malware to Phones

Checkmarx research shows that threat actors use a Popular TikTok Trend challenge to get people to download software that steals information.

This trend is call the “Invisible Challenge,” It uses a filter called “Invisible Body,” which only shows the person’s silhouette.

But the fact that people in these videos might be naked led to a bad plan where attackers post TikTok clips with links to fake software called “unfilter,” which claims to remove filters.

“Instructions to get the “unfiltered” software hide WASP stealer malware inside malicious Python packages,” Checkmarx researcher Guy Nachshon said in an analysis on Monday.

WASP Stealer, also called W4SP Stealer, is a malware design to steal passwords, Discord accounts, and cryptocurrency wallets.

On November 11, 2022, more than a million people watched the TikTok videos of the attackers @learncyber and @kodibtc. Now, their accounts have been take away.

Indian Student Confesses Real Reason for Crashing a Wedding [Video]

Popular TikTok Trend

The video also has an invitation link to a server on Discord that the enemy ran. Before it was report and shut down, this server had almost 32,000 users. After joining the Discord server, victims got a link to a GitHub repository that hosted the malware.

Since then, the attacker has changed the name to “Nitro generator,” but not before it made it onto GitHub’s Trending repository lists for November 27, 2022. He also asked people on Discord to give the project a star.

The person who made the threat also changed the repository’s name and added new files to the project. “It’s open source, and it’s not a virus,” they said about the updated Python source code. Now, the GitHub account has been take away.

The code for the stealer was in several Python packages, such as “tiktok filter-api,” “pyshftuler,” and “pydesings.” When these packages were remove, the operators put up replacements on the Python Package Index (“PyPI”) with different names.

Noted Nachshon:

The level of manipulation used by software supply chain attackers is increasing as attackers become increasingly clever. These attacks demonstrate again that cyber attackers have started to focus their attention on the open-source package ecosystem.

 Nestle Fake Verified Account Spoiling The Brand Reputation Using Twitter $8 Subscription

Iqra Kanwal is Getting Engaged, Reveals Fiancé Face

Sidra Asim

Recent Posts

Dance at Marka-e-Haq anniversary event in Sahiwal sparks Strong Criticism online

Dance at Marka-e-Haq anniversary event in Sahiwal: A musical night held in Sahiwal to commemorate…

1 day ago

Eidul Azha 2026: Five cattle markets to be established in Karachi

Before Eidul Azha 2026, the Karachi Metropolitan Corporation (KMC) was given permission by the port…

1 week ago

Imran’s Sons Welcome to Visit Pakistan on Nicop Cards as “Pakistani Citizens,” Attaullah Tarar

Imran’s Sons Welcome to Visit Pakistan: The sons of Imran Khan, Kasim and Sulaiman, are…

2 months ago

Basant 2026: Kite Flying banned in THESE Areas of Lahore

After 20 years of prohibition, the capital of Punjab, Lahore, will host Basant 2026. However,…

3 months ago

Murree Receives Heaviest Snowfall in 20 Years

Murree Receives Heaviest Snowfall in 20 Years: One of the largest snowstorms to hit Murree…

4 months ago

Jennifer Winget sizzles in Black Bikini, setting Internet on Fire

Jennifer Winget sizzles in Bikini: Jennifer Winget, an Indian TV personality, is making waves on…

6 months ago