Wednesday , February 26 2025
200 Fake GitHub

200 Fake GitHub Repos Attacking Developers to Deliver Malware

A new cyber campaign called GitVenom poses a serious risk to developers. Security researchers found over 200 fake GitHub repositories that disguise themselves as legitimate projects to distribute information stealers and remote access trojans (RATs).

For almost two years, these repositories have exploited developers’ trust in open-source platforms to access systems and steal sensitive data, such as cryptocurrency wallets and browser credentials.

200 Fake GitHub Repos Attacking Developers to Deliver Malware

A new cyber campaign called GitVenom poses a serious risk to developers. Security researchers found over 200 fake GitHub repositories...
Read More
200 Fake GitHub Repos Attacking Developers to Deliver Malware

Renew Dubai visa within minutes with AI-powered Salama

Residents of Dubai can now easily renew their visas with the new AI-powered digital platform launched by the General Directorate...
Read More
Renew Dubai visa within minutes with AI-powered Salama

CVE-2024-20953
CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

CVE-2024-20953 is a vulnerability in Oracle Agile PLM, a product lifecycle management tool. With a CVSS score of 8.8, it...
Read More
CVE-2024-20953  CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

Stablecoin Bank Hacked – Hackers Stolen $49.5M

Days after the biggest crypto hack ever, another platform has experienced a major exploit. Infini Earn, a decentralized stablecoin bank,...
Read More
Stablecoin Bank Hacked – Hackers Stolen $49.5M

CVE-2025-20029
PoC Exploit Released for F5 BIG-IP Command Injection Vuln

Security researchers have released a proof-of-concept exploit for CVE-2025-20029, a serious command injection vulnerability in F5’s BIG-IP application delivery controllers....
Read More
CVE-2025-20029  PoC Exploit Released for F5 BIG-IP Command Injection Vuln

By 1 April 2025
Australia Bans Kaspersky on its govt systems and devices

On February 21, the Australian Department of Home Affairs issued a directive prohibiting the installation of Kaspersky Lab products and...
Read More
By 1 April 2025  Australia Bans Kaspersky on its govt systems and devices

CISA Flags Craft CMS Code Injection Flaw Amid Active Attacks

CISA has added a serious security flaw in the Craft content management system (CMS) to its Known Exploited Vulnerabilities catalog...
Read More
CISA Flags Craft CMS Code Injection Flaw Amid Active Attacks

B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

On February 19, 2025, the illegal marketplace B1ack's Stash released over 1 million unique stolen credit and debit card details...
Read More
B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

Cisco Confirms
Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Cisco Talos reported that  Salt Typhoon, also known as FamousSparrow and GhostEmperor, has been spying on U.S. telecommunication providers using...
Read More
Cisco Confirms  Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

AWS Key Hunter
Test this free automated tool to hunt for exposed AWS secrets

A free tool is now available to scan public GitHub repositories for exposed AWS credentials. Security engineer Anmol Singh Yadav created...
Read More
AWS Key Hunter  Test this free automated tool to hunt for exposed AWS secrets

The GitVenom campaign creates realistic README.md files using AI-generated documentation, including multilingual installation guides and feature descriptions.

Attackers boost repository credibility by using automated timestamp updates to simulate frequent commits. Python projects may use a method where code decrypts and executes a harmful Python script, followed by many tab characters.

This script decrypts and runs a payload that downloads more malware from a GitHub repository controlled by an attacker.

JavaScript projects use Base64 encoding to hide functions that decode malicious scripts, while C/C++/C# repositories conceal batch scripts in Visual Studio project files, which activate payloads during builds.

Kaspersky’s data shows that infections are mainly in Russia, Brazil, and Turkey, indicating the campaign’s wide reach. GitVenom repositories imitate popular tools like Valorant cheats and Telegram bot integrations to attract developers.

Attackers misuse GitHub’s fork feature to clone legitimate projects, add hidden malware, and share them on forums and social media. Apiiro researchers found that even with automated takedowns, 1% of malicious repositories go undetected, allowing them to infect thousands of users.

Developers should implement strict code-review practices to address these threats:

Audit third-party code for issues like excessive whitespace or unclear functions.
Check repository authenticity by reviewing contributor history, star counts, and creation dates; new accounts with little activity may indicate fraud.
Use endpoint detection tools to identify suspicious activities, such as unauthorized .7z file creation or unexpected network connections to Telegram APIs.

CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

Check Also

Kaspersky

By 1 April 2025
Australia Bans Kaspersky on its govt systems and devices

On February 21, the Australian Department of Home Affairs issued a directive prohibiting the installation …

Leave a Reply

Your email address will not be published. Required fields are marked *