Malware, Phishing, Threat Intelligence

Global GitVenom malware campaign spurred by bogus GitHub repositories

In this photo illustration, the homepage of the GitHub website seen on a computer screen through a magnifying glass.

Hackread reports that several fake GitHub repositories masquerading as legitimate projects have been leveraged to facilitate the deployment of malicious payloads over the past two years as part of the global GitVenom malware campaign, which has primarily compromised Russia, Brazil, and Turkey.

Malicious actors behind GitVenom established repositories purporting to be a Telegram Bitcoin wallet bot, an Instagram automation software, and others that include highly convincing files and obfuscated malicious code, which when executed retrieves the Node.js information-stealing malware to compromise credentials, banking and cryptocurrency wallet details, and browsing history, according to a report from Kaspersky.

Attacks also involved the delivery of AsyncRAT and Quasar RAT remote administration tools to enable system takeovers, as well as a clipboard hijacker allowing the exfiltration of cryptocurrency assets to attacker-controlled wallets.

Such findings emphasize the importance of properly vetting third-party code, with organizations urged to evaluate the code's legitimacy prior to execution or integration.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds