Published in


Attacker Uses a Popular TikTok Challenge to Lure Users Into Installing Malicious Package

A trending TikTok challenge called “Invisible Challenge” where the person filming it poses naked while using a special video effect called “Invisible Body.” This effect removes the character’s body from the video, making a blurred contour image of it.

Attackers post TikTok videos with links to a fake software called “unfilter” that claims to be able to remove TikTok filters on videos shot while the actor was undressed.

Instructions to get the “unfilter” software deploy WASP stealer malware hiding inside malicious Python packages.

TikTok videos posted by the attacker reached over a million views in just a couple of days.

GitHub repo hosting the attacker’s code listed GitHub’s daily trending projects.

Over 30,000 members have joined the Discord server created by the attackers so far and this number continues to increase as this attack is ongoing.

TikTok’s Invisible Challenge

From time to time, there is a new dangerous trending challenge on social media. If you remember the “Tide Pods Challenge” or the “Milk Crate Challenge” you know exactly what I’m talking about.

This time, the latest trending challenge is called the “Invisible Challenge,” where the person filming poses naked while using a special video effect called “Invisible Body.” This effect removes the character’s body from the video, making a blurred contour image of it.

This challenge is quite popular on TikTok and currently has over 25 million views for the #invisiblefilter tag.

The TikTok users @learncyber and @kodibtc posted videos on TikTok (over 1,000,000 views combined) to promote a software app able to “remove filter invisible body“ with an invite link to join a Discord server “hxxp://discord[.]gg/unfilter” to get it.

Once you click the invite and join the Discord server “Space Unfilter,” there are NSFW videos uploaded by the attacker, claimed to be the result of his “unfilter” software. An attempt to include sample videos as proof to trick users agree to install his software.

In addition, a bot account, “Nadeko,” automatically sends a private message with a request to star the GitHub repository 420World69/Tiktok-Unfilter-Api.

This GitHub repository 420World69/Tiktok-Unfilter-Api represent itself as an open-source tool that can remove the invisible body effect trending on TikTok and currently has 103 starts and 17 forks, through which he gained the status of a trending GitHub project.

Inside the project’s files is a .bat script that installs a malicious Python package listed in the requirements.txt file.

Looking at the project’s history, the attacker used “pyshftuler”, a malicious package, but once it was reported and removed by PyPi, the attacker uploaded a new malicious package under a different name, “pyiopcs”. This latest package was also reported and removed, and he had yet to update his code.

In addition, the project’s README file contains a link to a YouTube tutorial instructing users on how to run the installation script.

Technical Analysis — Malicious Python Packages

This campaign is linked to other malicious Python packages, “tiktok-filter-api”, “pyshftuler”, and “pyiopcs,” and since this is an ongoing attack we’re keeping track of new updates.

At first glance, the attackers used the StarJacking technique as the malicious package falsely stated the associated GitHub repository is “”. However, this belongs to the Python package “requests”. Doing this makes the package appear popular to the naked eye.

On top of that, the attackers stole and modified the legitimate package’s description, and the code inside those packages seems to be stolen from the popular Python package “requests”.

Looking inside, we find under “./<package>/” a suspicious modification to the original file as a one-liner related to WASP’s infection code.

After a cat-mouse game, as the attacker’s packages have been caught, reported and removed by PyPi, the attacker decided to move his malicious infection line from the Python package to the requirements.txt as you can see in the screenshot below:


How does an attacker gain so much popularity in such a short time? He earned his status as a trending GitHub project by asking every new member on his server to “star” his project.

The high number of users tempted to join this Discord server and potentially install this malware is concerning.

The level of manipulation used by software supply chain attackers is increasing as attackers become increasingly clever.

It seems this attack is ongoing, and whenever the security team at Python deletes his packages, he quickly improvises and creates a new identity or simply uses a different name.

These attacks demonstrate again that cyber attackers have started to focus their attention on the open-source package ecosystem; We believe this trend will only accelerate in 2023.

As we see more and more different attacks, it is critical to expedite the flow of information on these attacks across all parties involved (package registries, security researchers, developers) to protect the open-source ecosystem against those threats.


2022–10–28 — WASP open source created
2022–11–10 — Discord server “Unfilter Space” created
2022–11–11 — TikTok videos published
2022–11–12 — Python package “tiktok-filter-api” published by the attacker
2022–11–12 — Python package “pyshftuler” published by the attacker
2022–11–12 — 420World69/Tiktok-Unfilter-Api GitHub repository created
2022–11–13 — “tiktok-filter-api” and “pyshftuler” reported as malicious to pypi
2022–11–18 — Python package “pyiopcs” published by the attacker
2022–11–19 — Python package “pyiopcs” reported as malicious to pypi
2022–11–22 — GitHub repo reported as malicious
2022–11–22 — Discord Server reported as malicious
2022–11–22 — TikTok videos reported as scam
2022–11–22 — Attacker moved malicious code from PyPi package to each file on his GitHub repo
2022–11–23 — Attacker removed the malicious code from his repo
2022–11–26 — Attacker added same malicious code to and
2022–11–27 — Discord server “Unfilter Space” deleted
2022–11–27 — Attacker changed his GitHub repository name to 42World69/Nitro-generator
2022–11–27 — Attacker deleted old files on his repo and uploaded files to fit Nitro-generator
2022–11–27 — Python package “pydesings” published by the team behind WASP
2022–11–27 — Attacker added malicious package “pydesings” to requirements.txt
2022–11–27 — Attacker added malicious code to
2022–11–28 — Python package “pyshdesings” published by WASP creators





Checkmarx empowers organizations to develop and release more secure software faster.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Guy Nachshon

A Software Engineer and member of the Supply Chain Security engineering group at Checkmarx.