Friday , March 28 2025
200 Fake GitHub

200 Fake GitHub Repos Attacking Developers to Deliver Malware

A new cyber campaign called GitVenom poses a serious risk to developers. Security researchers found over 200 fake GitHub repositories that disguise themselves as legitimate projects to distribute information stealers and remote access trojans (RATs).

For almost two years, these repositories have exploited developers’ trust in open-source platforms to access systems and steal sensitive data, such as cryptocurrency wallets and browser credentials.

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

CIRT alert Situational Awareness for Eid Holidays

As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
CIRT alert Situational Awareness for Eid Holidays

Cyberattack on Malaysian airports: PM rejected $10 million ransom

Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
Cyberattack on Malaysian airports: PM rejected $10 million ransom

Micropatches released for Windows zero-day leaking NTLM hashes

Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
Micropatches released for Windows zero-day leaking NTLM hashes

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
VMware Patches Authentication Bypass Flaw in Windows Tool

IngressNightmare
Over 40% of cloud environments are vulnerable to RCE

Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
IngressNightmare  Over 40% of cloud environments are vulnerable to RCE

(CVE-2025-29927)
Urgently Patch Your Next.js for Authorization Bypass

Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
(CVE-2025-29927)  Urgently Patch Your Next.js for Authorization Bypass

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft

Russian zero-day seller to offer up to $4 million for Telegram exploits

Operation Zero, a Russian zero-day broker, is offering up to $4 million for Telegram exploits. They seek $500K for one-click...
Read More
Russian zero-day seller to offer up to $4 million for Telegram exploits

The GitVenom campaign creates realistic README.md files using AI-generated documentation, including multilingual installation guides and feature descriptions.

Attackers boost repository credibility by using automated timestamp updates to simulate frequent commits. Python projects may use a method where code decrypts and executes a harmful Python script, followed by many tab characters.

This script decrypts and runs a payload that downloads more malware from a GitHub repository controlled by an attacker.

JavaScript projects use Base64 encoding to hide functions that decode malicious scripts, while C/C++/C# repositories conceal batch scripts in Visual Studio project files, which activate payloads during builds.

Kaspersky’s data shows that infections are mainly in Russia, Brazil, and Turkey, indicating the campaign’s wide reach. GitVenom repositories imitate popular tools like Valorant cheats and Telegram bot integrations to attract developers.

Attackers misuse GitHub’s fork feature to clone legitimate projects, add hidden malware, and share them on forums and social media. Apiiro researchers found that even with automated takedowns, 1% of malicious repositories go undetected, allowing them to infect thousands of users.

Developers should implement strict code-review practices to address these threats:

Audit third-party code for issues like excessive whitespace or unclear functions.
Check repository authenticity by reviewing contributor history, star counts, and creation dates; new accounts with little activity may indicate fraud.
Use endpoint detection tools to identify suspicious activities, such as unauthorized .7z file creation or unexpected network connections to Telegram APIs.

CISA Flags Oracle Agile PLM Actively Exploited Security Flaw

Check Also

VMware

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools …

Leave a Reply

Your email address will not be published. Required fields are marked *