logoalt Hacker News

mohsen1today at 2:07 PM2 repliesview on HN

If it was not spinning so many Python processes and not overwhelming the system with those (friends found out this is consuming too much CPU from the fan noise!) it would have been much more successful. So similar to xz attack

it does a lot of CPU intensive work

    spawn background python
    decode embedded stage
    run inner collector
    if data collected:
        write attacker public key
        generate random AES key
        encrypt stolen data with AES
        encrypt AES key with attacker RSA pubkey
        tar both encrypted files
        POST archive to remote host

Replies

franktankbanktoday at 2:19 PM

I can't tell which part of that is expensive unless many multiples of python are spawned at the same time. Are any of the payloads particularly large?