Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Let’s Encrypt Halts Certificate Issuance Due to Let’s After
May 9, 2026
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
Home/Threats/Trojanized PyPI AI Proxy Uses Stolen Claude Prompt to Exfiltrates Data
Threats

Trojanized PyPI AI Proxy Uses Stolen Claude Prompt to Exfiltrates Data

Security researchers have identified a malicious Python package on PyPI, masquerading as a privacy-focused AI inference tool, which covertly exfiltrates sensitive user data. Named hermes-px, the...

David kimber
David kimber
April 6, 2026 3 Min Read
7 0

Security researchers have identified a malicious Python package on PyPI, masquerading as a privacy-focused AI inference tool, which covertly exfiltrates sensitive user data.

Named hermes-px, the package marketed itself as a “Secure AI Inference Proxy” that routes all AI requests through the Tor network to protect user anonymity.

In reality, it hijacked a private university’s internal AI endpoint, collected every message users sent through it, and exposed the real IP addresses of unsuspecting victims — all without users ever knowing.

What made this threat especially dangerous was how convincingly it was built. The package came with detailed documentation, installation instructions, code examples, a migration guide from the OpenAI Python SDK, and a working Retrieval-Augmented Generation pipeline.

It presented itself as the product of a fictional company called “EGen Labs,” with an API surface nearly identical to OpenAI’s own Python library. Developers searching for a free, privacy-forward AI tool would have had very little reason to suspect that anything was wrong.

JFrog Security researchers identified hermes-px on April 5, 2026, uncovering the full scope of the deception.

Led by security researcher Guy Korolevski, the team revealed how the package silently funneled every user conversation directly to an attacker-controlled Supabase database, all while falsely promising end-to-end anonymity through Tor.

The package specifically targeted software developers who work with AI models and were looking for a free, easy-to-use alternative to paid SDKs.

Once installed from PyPI and integrated into a live project, every prompt a developer sent was quietly logged without any visible sign.

The package’s README also included an “Interactive Learning CLI” section that instructed users to fetch and execute a Python script directly from a GitHub URL at runtime.

hermes-px README CLI Execution Command (Source - JFrog)
hermes-px README CLI Execution Command (Source – JFrog)

This gave the attacker a secondary code execution channel, allowing updated malicious payloads to be delivered without needing to publish a new version of the package.

The broader impact went far beyond simple data collection. Users unknowingly abused the private AI infrastructure of Universite Centrale, the largest private university in Tunisia, without their knowledge or consent.

To make things worse, the exfiltration bypassed Tor entirely and used the victim’s direct internet connection, exposing their real IP address — the very protection hermes-px had openly promised to provide.

How the Stolen Claude Prompt Powered the Attack

At the core of hermes-px sat a compressed file called base_prompt.pz, which contained a massive 246,000-character system prompt. When decompressed, it turned out to be a near-complete copy of Anthropic’s proprietary Claude Code system prompt.

The attacker had tried to rebrand it by swapping “Claude” with “AXIOM-1” and “Anthropic” with “EGen Labs,” but the substitution was incomplete.

Six references to “Claude” and two to “Anthropic” survived, along with Claude-specific function names, internal infrastructure markers, and sandbox filesystem paths that no fabricated prompt could realistically contain.

This stolen prompt was injected into every API call, alongside encrypted payloads that mimicked academic advising chatbot instructions from the university’s own internal service.

System Prompt Injection per API Call (Source - JFrog)
System Prompt Injection per API Call (Source – JFrog)

To shield these stolen secrets from security tools, the package used a triple-layer obfuscation chain: all sensitive strings were first XOR-encrypted with a 210-byte rotating key, then compressed using zlib, and finally encoded in base64. 

No readable credentials or endpoint URLs existed anywhere in the package files at rest, and all values were decoded only in memory at runtime, making standard static analysis largely ineffective against this kind of hidden threat.

Anyone who installed hermes-px should remove it immediately by running pip uninstall hermes-px. All credentials, API keys, or sensitive data included in prompts sent through the package must be rotated without delay.

Every conversation passed through the package should be treated as fully captured and reviewed carefully for passwords, internal URLs, proprietary code, or personal information.

The attacker’s exfiltration endpoint urlvoelpilswwxkiosey[.]supabase[.]co should be blocked at the network level. If Tor was installed for this package, removing it will help reduce the overall attack surface.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

GitHub Actions Attack Exfiltrates Secrets via Fake CI

Next Post

North Korea-Linked Exploit Drains $28 Hackers Million

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us