← Back to feed

Fake OpenAI Privacy Filter Hugging Face Repository Delivers Infostealer—244K Downloads Before Removal; Linked to Broader Supply Chain Campaign

Date: 2026-05-16
Tags: supply-chain, malicious-tool, malware

Executive Summary

A malicious Hugging Face repository posing as an OpenAI release delivered infostealer malware to Windows systems and logged 244,000 downloads before being removed. The repository, named Open-OSS/privacy-filter, impersonated OpenAI's legitimate Privacy Filter release, copied its model card almost word-for-word, and included a malicious loader.py file that fetched and executed credential-stealing malware on Windows hosts. The repository reached the #1 trending position on Hugging Face with approximately 244K downloads and 667 likes in under 18 hours, numbers that were almost certainly artificially inflated to make the repository appear legitimate.

Campaign Summary

FieldDetail
Campaign / MalwareOpen-OSS/privacy-filter Hugging Face Supply Chain Attack
AttributionUnknown (Likely Organized Supply Chain Campaign) (confidence: medium)
TargetWindows developers downloading AI security/privacy tools from Hugging Face
VectorTyposquatting legitimate OpenAI Privacy Filter on Hugging Face; malicious loader.py via postinstall hook; infostealer payload via jsonkeeper.com C2
Statusremoved
First Observed2026-05-07

Detailed Findings

According to HiddenLayer, the loader.py script first executes decoy code that resembles a legitimate AI model loader before launching a concealed infection chain. The script disabled SSL verification, decoded a base64-encoded URL linked to the public JSON hosting service jsonkeeper.com, retrieved a remote payload instruction, and passed commands to PowerShell. Using jsonkeeper.com as the C2 channel lets the attacker rotate the payload without modifying the repository. The resulting PowerShell command downloaded an additional batch file from an attacker-controlled domain and established persistence by creating a scheduled task designed to mimic a legitimate Microsoft Edge update process. HiddenLayer identified six additional Hugging Face repositories uploaded under a separate account that used nearly identical loader logic and shared infrastructure with the campaign. The researchers also linked elements of the operation to earlier software supply-chain attacks involving npm typosquatting campaigns and fake AI packages distributed through PyPI. The shared infrastructure "suggests these campaigns are possibly linked and likely part of a broader supply chain operation targeting open-source ecosystems."

MITRE ATT&CK Mapping

TechniqueIDContext
Supply Chain CompromiseT1195Compromised public AI model repository (Hugging Face) to distribute infostealer malware
Typosquatting / MasqueradingT1583.006Malicious repo copied legitimate OpenAI Privacy Filter project metadata
Execution via CodeT1059Loader.py executes obfuscated PowerShell to fetch and run Winos 4.0 stager binary
Persistence via Scheduled TaskT1053.005Creates scheduled task mimicking Microsoft Edge update to maintain persistence

IOCs

Domains

jsonkeeper.com

Full URL Paths

https://www.huggingface.co/Open-OSS/privacy-filter

Splunk Format

"jsonkeeper.com" OR "https://www.huggingface.co/Open-OSS/privacy-filter"

File Hashes

6d5b1b7b9b95f2074094632e3962dc21432c2b7dccfbbe2c7d61f724ffcfea7c
c1b59cc25bdc1fe3f3ce8eda06d002dda7cb02dea8c29877b68d04cd089363c7

Package Indicators

Open-OSS/privacy-filter (Hugging Face)

Detection Recommendations

Monitor Hugging Face trending repositories for repositories with identical names to legitimate projects but different authors. Implement content hash validation for downloaded model repositories; alert on .py files in model repos that perform network I/O. Scan for scheduled tasks named after system update processes (Edge, Windows Update). Monitor jsonkeeper.com and similar JSON hosting services for malicious payload rotation patterns. Block PowerShell execution from Python package postinstall hooks. Threat hunt for Winos 4.0 stager binary (CodeRun102.exe) and associated persistence mechanisms.

References