Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Programming Security IT

A Hacker 'Ghost' Network Is Quietly Spreading Malware on GitHub (wired.com) 16

Researchers at Check Point have uncovered a clandestine network of approximately 3,000 "ghost" accounts on GitHub, manipulating the platform to promote malicious content. Since June 2023, a cybercriminal dubbed "Stargazer Goblin" has been exploiting GitHub's community features to boost malicious repositories, making them appear legitimate and popular.

Antonis Terefos, a malware reverse engineer at Check Point, discovered the network's activities, which include "starring," "forking," and "watching" malicious pages to increase their visibility and credibility. The network, named "Stargazers Ghost Network," primarily targets Windows users, offering downloads of seemingly legitimate software tools while spreading various types of ransomware and info-stealer malware.
This discussion has been archived. No new comments can be posted.

A Hacker 'Ghost' Network Is Quietly Spreading Malware on GitHub

Comments Filter:
  • If they found these accounts, did they remove them? Did they also examine them so they can try to recognize this type in the future?

    Inquiring minds want to know.

  • Just use the free Git part of it and ignore the social network garbage. The stars, followers and activity things are just pointless feel-good nonsense and gamification.

    • by Luthair ( 847766 )

      If you ignore the stars its even easier for bad guys to trick you since they don't even need to bother to pretend the repository is popular.

      When I'm looking at an open source project I'm not familiar with I begin with the assumption its malware. For larger projects it often impractical to do a security assessment so you're left with the heuristic of who is working on it and who else is using it.

  • I wonder if GitHub needs verified tiers. For example, my GHE account is not just a paid account, but secured with a set of YubiKeys, has its own SSH and GPG keys. Of course, all those can be easily spam-created, but maybe we need to have some mechanism similar to Facebook, where it sends your address a snail mail item with a code in it, you type that in, and it confirms that the user has access to that physical address. Similar with a government ID. Maybe even tie into id.me or something similar to give

  • Quietly spreading malware on Github? Must be Microsoft.

  • by Seven Spirals ( 4924941 ) on Wednesday July 24, 2024 @06:46PM (#64653306)
    The liblzma hack proves that the Chinese and possibly other foreign actors are definitely trying to backdoor open source. They are probably trying to backdoor commercial software inside of Microsoft or other companies, too. I'd definitely pick SolarWinds as a target or some other widely used software (WhatsUp Gold or 7zip for example). All it would take is one Fang Fang to bang and setup some lonely long-haired coder and we'd see some fairly dramatic results. It's a target rich environment.

    If they can hack the government and steal the HR records for all of our government employees (21M employee OPM Hack) I'm pretty sure that backdooring some little underfunded FOSS project would be no problem. They almost pulled it off with the XZ hack and that would have been absolutely devastating. Does anyone actually think that was their first try ?
  • by pauljlucas ( 529435 ) on Wednesday July 24, 2024 @10:12PM (#64653592) Homepage Journal
    An open-source project I have on GitHub occasionally gets forked by various accounts. However, AFAICT, they never do anything with the clones, i.e., they never make any of their own changes. So why do they bother cloning in the first place?

That's the thing about people who think they hate computers. What they really hate is lousy programmers. - Larry Niven and Jerry Pournelle in "Oath of Fealty"

Working...