Fake GitHub projects distribute stealers in GitVenom campaign
Feb. 24, 2025, 4:52 p.m.
Description
The GitVenom campaign involves threat actors creating hundreds of fake repositories on GitHub containing malicious code disguised as legitimate projects. These repositories include well-designed README files and artificially inflated commit numbers to appear genuine. The malicious code, implemented in various programming languages, downloads and executes further malicious components from attacker-controlled repositories. These components include a Node.js stealer, AsyncRAT, Quasar backdoor, and a clipboard hijacker targeting cryptocurrency transactions. The campaign has been active for several years, with infection attempts observed worldwide, particularly in Russia, Brazil, and Turkey. The attackers' tactics highlight the importance of carefully examining third-party code before integration or execution.
Tags
Date
- Created: Feb. 24, 2025, 2:22 p.m.
- Published: Feb. 24, 2025, 2:22 p.m.
- Modified: Feb. 24, 2025, 4:52 p.m.
Indicators
- bd44a831ecf463756e106668ac877c6b66a2c0b954d13d6f311800e75e9c6678
- 06d0d13a4ce73775cf94a4a4f2314490de1d5b9af12db8ba9b01cd14222a2756
Attack Patterns
- Quasar
- AsyncRAT
- T1102.002
- T1059.006
- T1059.003
- T1059.001
- T1059.007
- T1552
- T1056.001
- T1555
- T1113
- T1071.001
- T1204.002
- T1005
- T1105
- T1140
- T1027
- T1059
Additional Informations
- Brazil
- Russian Federation