Cloud Security
,
Security Operations
JFrog uncovers multi-stage malware harvesting cloud secrets

Multi-stage malware embedded in a Python package is stealing sensitive cloud infrastructure data, JFrog researchers said Monday.
See Also: On Demand | Balancing Agility, Cost & Risk in Cloud Environments
The JFrog Security Research team disclosed its discovery of a malicious package named chimera-sandbox-extensions
on the Python Package Index or PyPI. The package steals credentials, configuration files, API tokens and other data from corporate cloud environments.
Uploaded by a user called chimerai, the malware targets developers using the Chimera sandbox platform.
The attack sequence begins with the package calling a function named check_update()
after installation. This function connects to domains generated by a domain generation algorithm, of which only one, twdtsgc8iuryd0iu.chimerasandbox.workers.dev/auth
, is active. After connecting, the malware downloads and executes a first-stage payload that retrieves an authentication token, which is then used to pull in a second payload, a Python-based infostealer.
This second-stage malware targets high-value data, including JAMF receipts, Git configurations, CI/CD pipeline variables, Zscaler configurations, AWS tokens and system metadata. The stolen information is packaged into a JSON object and sent via POST request back to the command-and-control server. The malware’s logic suggests a third payload could be deployed, though JFrog did not identify this payload during analysis.
JFrog reported the malicious package to PyPI maintainers, who have removed it. The malware’s sophistication and targeted nature distinguish it from generic infostealers, researchers said. It poses a significant risk to organizations using corporate and cloud development environments.
Researchers said, that the chimera-sandbox-extensions
package is a reminder of the ever-evolving risks in the open-source software supply chain. Development and security teams must adopt multi-layered defensive strategies to prevent such sophisticated breaches from compromising critical infrastructure.