Threat Actors Manipulate GitHub Search to Deliver Malware

Threat Actors Manipulate GitHub Search to Deliver Malware

April 12, 2024 at 07:36AM

GitHub search results are being manipulated by threat actors to infect developers with persistent malware, Checkmarx warns. Attackers create malicious repositories with popular names and boost their search rankings using automated updates and fake stars. Unsuspecting users are lured to these repositories, unaware of the hidden dangers. Checkmarx stresses the need for thorough code inspections and manual reviews in light of these incidents.

Based on the meeting notes, the key takeaways are:

1. Threat actors have been observed manipulating GitHub search results to infect developers with persistent malware, using methods such as creating malicious repositories with popular names, boosting search rankings with automated updates and fake stars, and abusing GitHub Actions to update repositories.

2. The malware is designed to target cryptocurrency wallets, is deployed persistently on Windows machines, and attempts to achieve persistence using a scheduled task pointing to an executable file.

3. The campaign has been successful, with numerous malicious repositories receiving complaints from infected users.

4. Checkmarx emphasizes the need for developers to be cautious and not rely solely on the reputation of open source code, but to perform manual code reviews or use specialized tools for thorough code inspections for malware.

Additionally, it is noted that the malware contains similarities to the ‘Keyzetsu clipper’ malware and that it has been evolving, as evidenced by the use of a new URL leading to an archived executable file on April 3. The attackers have demonstrated tactics to evade detection by security solutions, such as padding the executable with zeros.

The related topics mentioned in the notes include “Cyber Insights 2024: Supply Chain,” “Eight Vulnerabilities Disclosed in the AI Development Supply Chain,” and “New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise.”

Please let me know if you need further information or if there are any specific actions to be taken based on this summary.

Full Article