Security: Typosquat repository distributing Boxter malware

#17
by ULTRAKlLL - opened

The repository Open-OSS/privacy-filter is impersonating this
official OpenAI model. It copies this model card verbatim but
adds a malicious loader.py and start.bat that distribute
Boxter family malware.

Repository: https://huggingface.co/Open-OSS/privacy-filter
Current stats: 244,168 downloads, 208 likes

Attack chain:

  1. start.bat executes loader.py before installing dependencies
  2. loader.py fetches PowerShell command from jsonkeeper.com/b/AVNNE
  3. PowerShell downloads api.eth-fastscan.org/update.bat
  4. update.bat is Boxter malware (VT: 8/60)
    SHA256: d64adb275165847f9f99a7d4d31b1bef8ad5755e5c2736774eaeebcc3361ec4a

VirusTotal: https://www.virustotal.com/gui/file/d64adb275165847f9f99a7d4d31b1bef8ad5755e5c2736774eaeebcc3361ec4a

Already reported to HF security team. Posting here so OpenAI
is aware and other users searching for this model see the warning.

Related campaign: NVISO Labs (Nov 2025) reported the same
jsonkeeper.com abuse for Contagious Interview campaign:
https://blog.nviso.eu/2025/11/13/contagious-interview-actors-now-utilize-json-storage-services-for-malware-delivery/

Thank you for the report. It seems to be down now.

mihaimaruseac changed discussion status to closed

Sign up or log in to comment