New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

November 12, 2024 at 10:15AM

Cybersecurity researchers warn of GoIssue, a tool for orchestrating large-scale phishing attacks on GitHub users by extracting emails from profiles. Marketed by a threat actor, it enables customized mass email campaigns, increasing risks of data theft and breaches. Additionally, a new two-step phishing attack uses compromised Microsoft files.

### Meeting Takeaways – November 12, 2024

**Key Points on GoIssue Phishing Tool:**
1. **Introduction to GoIssue:** A sophisticated tool for sending bulk phishing messages to GitHub users, marketed by a threat actor known as cyberdluffy.
2. **Functionality:** The tool extracts email addresses from public GitHub profiles and allows attackers to send targeted bulk emails directly to inboxes.
3. **Current Pricing:** Special launch prices are set at $150 for a custom build and $1,000 for the full source code for the first five customers, significantly reduced from the original prices of $700 and $3,000.

**Threat Overview:**
– **Risks Involved:** GoIssue enables attackers to execute customized mass email campaigns, potentially leading to source code theft, data breaches, and compromise of developer credentials.
– **Attack Scenarios:** Threat actors can redirect victims to phishing sites to capture login details, distribute malware, or push unauthorized OAuth applications for access to sensitive GitHub repositories.

**Connection to Gitloker Team:**
– **Affiliation:** cyberdluffy claims to be part of Gitloker Team, notorious for prior GitHub-focused extortion tactics involving misleading communications and compromised accounts.
– **Attack Mechanism:** Involves leveraging bot-initiated comments on GitHub to trigger emails that lure users into granting access to malicious apps, which can lead to data loss and ransom demands.

**Emerging Phishing Techniques:**
– **Two-Step Phishing Attacks:** Perception Point unveiled a new method that utilizes compromised Microsoft Visio and SharePoint files to steal credentials, by mimicking business proposals from breached accounts.
– **Exploitation of User Trust:** The use of trusted platforms (like SharePoint) and familiar file types for phishing increases the likelihood of user interaction, evading standard email security measures.

**Action Items:**
– Stay informed about emerging phishing tactics.
– Consider implementing additional security measures to protect developer accounts and sensitive data.
– Encourage vigilance among developers regarding unsolicited emails and links, particularly those related to job recruitment or unauthorized access requests.

### Follow-Up:
For continuous updates and further insights on cybersecurity threats, follow relevant channels on Twitter and LinkedIn.

Full Article