Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

bitcoin tests key resistance zone to form next major breakout

14 minutes ago

First US Hyperliquid ETF Clocks $1.2M Inflows on Debut

21 minutes ago

BTC price will ‘explode’ past $90,000 to reclaim $126,000, prominent fund manager says

1 hour ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Wednesday, May 13
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»Fake OpenAI Repo Hit #1 on Hugging Face—And Stole Passwords While It Trended
Cryptocurrency & Free Speech Finance

Fake OpenAI Repo Hit #1 on Hugging Face—And Stole Passwords While It Trended

News RoomBy News Room11 hours agoNo Comments4 Mins Read1,706 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
Fake OpenAI Repo Hit #1 on Hugging Face—And Stole Passwords While It Trended
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

In brief

  • A malicious Hugging Face repository impersonating OpenAI’s Privacy Filter model reached #1 trending on the platform.
  • The malware registered approximately 244,000 downloads and 667 likes in under 18 hours before being removed.
  • The repository delivered a six-stage infostealer that harvested browser passwords, Discord tokens, crypto wallet keys, and SSH credentials from Windows machines—then silently sent everything to attacker-controlled servers.

OpenAI released Privacy Filter in late April—a small, open-weight model built to detect and automatically redact personally identifiable information from text. It landed on Hugging Face under an Apache 2.0 license and quickly attracted developer interest. Someone noticed.

Within days, a fake account named “Open-OSS” published a near-identical repository called privacy-filter. The model card was copied word for word from OpenAI’s. The only difference in the “readme” file: instructions to clone the repo and run a file called start.bat on Windows, or loader.py on Linux and Mac.

Within 18 hours, the fake repo hit #1 on Hugging Face’s trending page—racking up approximately 244,000 downloads and 667 likes. HiddenLayer, the AI security firm that flagged the campaign, found that 657 of those 667 likes came from accounts matching predictable auto-generated bot-naming patterns.

The download numbers were almost certainly inflated the same way. Manufactured social proof to make the bait look real.

How the malware actually worked

The malware basically worked like a poisoned pill wrapped in a very convincing candy coating. The loader.py script opens with fake model training output—progress bars, synthetic datasets, dummy class names—designed to look like a real AI loader is running.

Under the hood, it quietly disables security checks, pulls an encoded command from a public JSON paste site (a smart trick: no need to update the repository when the payload changes), and passes that command to PowerShell running completely hidden in the background. Windows users see nothing.

That command downloads a second script from a domain mimicking a blockchain analytics API. That script downloads the actual malware—a custom-built infostealer written in Rust—adds it to Windows Defender’s exclusions list, then launches it at SYSTEM-level privileges via a scheduled task that immediately deletes itself after firing. The whole chain runs and cleans up after itself, leaving almost no trace.

The final payload is thorough. It grabs everything stored in Chrome and Firefox—saved passwords, session cookies, browser history, encryption keys, everything. It targets Discord accounts, cryptocurrency wallet seed phrases, SSH keys, FTP credentials, and takes screenshots across all monitors. Then it packages everything as a compressed JSON bundle and ships it to attacker-controlled servers.

There’s no need for us to tell you what the hackers can do with all that information later.

The malware also checks whether it’s running in a virtual machine or a security sandbox, and quits quietly if it detects one. It’s designed to run once on real targets, steal everything, and disappear.

Why this is bigger than just one repo

This isn’t an isolated incident. It’s part of a pattern. HiddenLayer identified six additional repositories under a separate Hugging Face account named “anthfu,” uploaded in late April, using the exact same malicious loader pointing to the exact same command server. Those repos impersonated models like Qwen3, DeepSeek, and Bonsai to lure AI developers.

The infrastructure itself—a domain called api.eth-fastscan.org—was also observed hosting a separate malware sample that beacons to a command server. HiddenLayer believes the connection between the two campaigns is “possibly linked” and cautions that shared infrastructure alone doesn’t confirm a single operator.

This is what a supply chain attack against the AI developer community looks like. The attacker doesn’t break into OpenAI or Hugging Face. They just publish a convincing lookalike, game the trending algorithm with bots, and wait for developers to do the rest. A similar playbook hit the Lottie Player JavaScript library in 2024, costing one user 10 Bitcoin (worth over $700,000 at the time).

What if you downloaded it?

If you cloned Open-OSS/privacy-filter on a Windows machine and ran any file from it, you should treat the device as fully compromised. Don’t log into anything from that machine before wiping it.

After that, change all the credentials that were stored in your browser—passwords, session cookies, OAuth tokens. Move any crypto funds to a new wallet generated on a clean device ASAP and assume seed phrases were stolen.

Since it also gets your Discord information, and that service is heavily automated, you should invalidate your Discord sessions and reset that password. Any SSH keys or FTP credentials on that machine should be considered burned.

The repository is now removed. Huggingface has not disclosed what, if any, additional screening measures it plans to implement for trending repositories.

As of now, seven confirmed malicious repositories from this campaign have been identified. How many more exist—or existed before being detected—remains unknown.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.

Read the full article here

Fact Checker

Verify the accuracy of this article using AI-powered analysis and real-time sources.

Get Your Fact Check Report

Enter your email to receive detailed fact-checking analysis

5 free reports remaining

Continue with Full Access

You've used your 5 free reports. Sign up for unlimited access!

Already have an account? Sign in here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
News Room
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

The FSNN News Room is the voice of our in-house journalists, editors, and researchers. We deliver timely, unbiased reporting at the crossroads of finance, cryptocurrency, and global politics, providing clear, fact-driven analysis free from agendas.

Related Articles

Cryptocurrency & Free Speech Finance

bitcoin tests key resistance zone to form next major breakout

14 minutes ago
Cryptocurrency & Free Speech Finance

First US Hyperliquid ETF Clocks $1.2M Inflows on Debut

21 minutes ago
Cryptocurrency & Free Speech Finance

BTC price will ‘explode’ past $90,000 to reclaim $126,000, prominent fund manager says

1 hour ago
Cryptocurrency & Free Speech Finance

EToro Income Jumps 37% on Commodities Boom as Crypto Trading Falls

1 hour ago
Cryptocurrency & Free Speech Finance

DTCC taps Chainlink for its tokenized collateral platform ahead of Q4 launch

2 hours ago
Cryptocurrency & Free Speech Finance

Upexi Stock Falls Amid Q3 Widened Net Loss on Solana Holdings

2 hours ago
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

First US Hyperliquid ETF Clocks $1.2M Inflows on Debut

21 minutes ago

BTC price will ‘explode’ past $90,000 to reclaim $126,000, prominent fund manager says

1 hour ago

EToro Income Jumps 37% on Commodities Boom as Crypto Trading Falls

1 hour ago

DRC journalist detained since January, another in hiding after mining impact report

2 hours ago
Latest Posts

DTCC taps Chainlink for its tokenized collateral platform ahead of Q4 launch

2 hours ago

Upexi Stock Falls Amid Q3 Widened Net Loss on Solana Holdings

2 hours ago

Brickbat: Red Meat Issues

3 hours ago

Subscribe to News

Get the latest news and updates directly to your inbox.

At FSNN – Free Speech News Network, we deliver unfiltered reporting and in-depth analysis on the stories that matter most. From breaking headlines to global perspectives, our mission is to keep you informed, empowered, and connected.

FSNN.net is owned and operated by GlobalBoost Media
, an independent media organization dedicated to advancing transparency, free expression, and factual journalism across the digital landscape.

Facebook X (Twitter) Discord Telegram
Latest News

bitcoin tests key resistance zone to form next major breakout

14 minutes ago

First US Hyperliquid ETF Clocks $1.2M Inflows on Debut

21 minutes ago

BTC price will ‘explode’ past $90,000 to reclaim $126,000, prominent fund manager says

1 hour ago

Subscribe to Updates

Get the latest news and updates directly to your inbox.

© 2026 GlobalBoost Media. All Rights Reserved.
  • Privacy Policy
  • Terms of Service
  • Our Authors
  • Contact

Type above and press Enter to search. Press Esc to cancel.

🍪

Cookies

We and our selected partners wish to use cookies to collect information about you for functional purposes and statistical marketing. You may not give us your consent for certain purposes by selecting an option and you can withdraw your consent at any time via the cookie icon.

Cookie Preferences

Manage Cookies

Cookies are small text that can be used by websites to make the user experience more efficient. The law states that we may store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses various types of cookies. Some cookies are placed by third party services that appear on our pages.

Your permission applies to the following domains:

  • https://fsnn.net
Necessary
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Statistic
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Preferences
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.