HomeCyber BalkansGitVenom Campaign Targets GitHub Repositories to Infect Users

GitVenom Campaign Targets GitHub Repositories to Infect Users

Published on

spot_img

The GitVenom campaign, a sophisticated cyber threat, has been utilizing GitHub repositories to propagate malware and pilfer cryptocurrency. This devious campaign involves the creation of numerous fake GitHub repositories that present themselves as legitimate but actually harbor malicious code.

These repositories are strategically crafted to entice unsuspecting developers into downloading and executing the malicious code, which could result in substantial financial losses. The perpetrators behind GitVenom have designed their phony projects in various programming languages, including Python, JavaScript, C, C++, and C#.

These fake projects often promise functionalities such as automation tools for social media or cryptocurrency management, but in reality, they perform meaningless actions while concealing malicious code. For example, Python-based projects employ a technique where a prolonged line of tab characters is followed by code that decrypts and executes a malicious Python script.

In JavaScript projects, malicious functions are integrated to decode and execute scripts from Base64. Similarly, for C, C++, and C# projects, malicious batch scripts are concealed within Visual Studio project files to execute during the build process. The malevolent payloads disseminated from these fraudulent projects intend to download additional malicious components from a GitHub repository controlled by the attacker.

These components include a Node.js stealer that amasses sensitive information like credentials and cryptocurrency wallet data, transmits it to the attackers through Telegram, and employs tools like the open-source AsyncRAT and Quasar backdoors. According to a report by SecureList, a clipboard hijacker is also utilized to replace cryptocurrency wallet addresses with those managed by the attackers, resulting in substantial financial theft.

One particular Bitcoin wallet controlled by the attackers received approximately 5 BTC (equivalent to $485,000 at the time) in November 2024. The impact of the GitVenom campaign has been extensive, with infection attempts observed globally, especially in regions like Russia, Brazil, and Turkey.

This campaign underscores the dangers associated with blindly executing code from GitHub or other open-source platforms. To mitigate these risks, developers must meticulously scrutinize third-party code before incorporating it into their projects. This involves examining for suspicious code patterns and verifying that the code aligns with the stated functionalities.

As the reliance on open-source code continues to expand, the potential for similar campaigns also increases, underscoring the necessity for caution when handling third-party code. The ongoing threat posed by the GitVenom campaign serves as a reminder of the importance of cybersecurity vigilance in the digital age.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...