200 Malicious GitHub Repos Attacking Developers to Deliver Malware


In an era where open-source collaboration drives software innovation, a sophisticated cyber campaign dubbed GitVenom has emerged as a critical threat to developers. 

Security researchers have uncovered over 200 malicious GitHub repositories designed to distribute information stealers and remote access trojans (RATs) by masquerading as legitimate projects. 

These repositories, active for nearly two years, exploit developers’ trust in open-source platforms to infiltrate systems and exfiltrate sensitive data, including cryptocurrency wallets and browser credentials.

The GitVenom campaign leverages AI-generated documentation to create convincing README.md files, complete with multilingual installation guides and feature descriptions. 

Attackers artificially inflate repository credibility through automated timestamp updates, simulating frequent commits. 

Attackers used AI to write detailed instructions in multiple languages

For instance, Python-based projects employ a method in which code that decrypts and runs a malicious Python script is followed by a long string of tab characters.

This script decrypts and executes a payload fetching additional malware from an attacker-controlled GitHub repository.

JavaScript projects embed Base64-encoded functions to decode malicious scripts, while C/C++/C# repositories hide batch scripts in Visual Studio project files, triggering payload deployment during builds.

Malware Payloads and Financial Impact

Node.js Stealer: Harvests credentials, cryptocurrency wallet data (e.g., MetaMask), and browser histories, compressing them into .7z archives exfiltrated via Telegram bots.

AsyncRAT and Quasar: Open-source RATs enabling remote command execution, screen capture, and keylogging. Command-and-control (C2) servers at 68.81[.]155 orchestrate attacks.

Clipboard Hijacker: Monitors clipboard activity, replacing cryptocurrency addresses with attacker-controlled wallets. One Bitcoin address (bc1qtxlz2m6r[…]yspzt) received 5 BTC (~$485,000) in November 2024.

Kaspersky’s telemetry reveals infections concentrated in Russia, Brazil, and Turkey, though global targeting underscores the campaign’s scalability.

GitVenom repositories mimic popular tools, such as Valorant cheats and Telegram bot integrations, to lure developers. 

Attackers exploit GitHub’s fork mechanism, cloning legitimate projects and injecting obfuscated malware before redistributing them through forums and social channels.

Despite GitHub’s automated takedowns, Apiiro researchers note that 1% of malicious repositories evade detection, persisting long enough to infect thousands

Mitigation Strategies for Developers

To counter these threats, developers must adopt stringent code-review practices:

  • Audit third-party code for anomalies like excessive whitespace or obfuscated functions.
  • Verify repository authenticity by checking contributor history, star counts, and creation dates. New accounts with sparse activity signal potential fraud.
  • Deploy endpoint detection tools to intercept suspicious processes, such as unauthorized .7z archive creation or unexpected network connections to Telegram APIs.

According to the Report, GitHub has intensified its anti-automation measures, but manual reporting remains critical. Users encountering suspicious repositories should flag them via GitHub’s reporting system to disrupt the malware lifecycle.

Developers must balance efficiency with security, ensuring every imported line of code undergoes rigorous scrutiny.

With cryptocurrency theft and credential harvesting fueling these operations, proactive defense—not reactive mitigation—will define the next era of cybersecurity.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here



Source link