Supply Chain Risk in Python: Termcolor and Colorama Explained

Aug. 18, 2025, 4:42 p.m.

Description

A suspicious Python package named termncolor was discovered, which imports a malicious dependency called colorinal. This multi-stage malware operation leverages DLL sideloading to decrypt payloads, establish persistence, and conduct command-and-control communication, ultimately leading to remote code execution. The attack begins with the execution of terminate.dll, which decrypts and deploys two files: vcpktsvr.exe and libcef.dll. The malware achieves persistence through a registry entry and gathers system information. It communicates with a C2 server using Zulip traffic patterns for disguise. The threat actor's profile and activities on the Zulip platform were analyzed, revealing patterns in their tactics and behavior.

Date

  • Created: Aug. 16, 2025, 1:53 a.m.
  • Published: Aug. 16, 2025, 1:53 a.m.
  • Modified: Aug. 18, 2025, 4:42 p.m.

Attack Patterns