Tuesday, February 25, 2025
HomeCyber Security News200 Malicious GitHub Repositories Distributing Malware to Developers

200 Malicious GitHub Repositories Distributing Malware to Developers

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake projects masquerading as legitimate tools.

The repositories, active for nearly two years, deploy stealers, remote access Trojans (RATs), and clippers to compromise systems and steal sensitive data, including cryptocurrency wallets.

According to the Kaspersky Report, Security researchers estimate the threat actors behind GitVenom have stolen at least 5 BTC (≈$485,000) through this operation.

Campaign Mechanics and Evasion Tactics

The malicious repositories impersonate popular developer tools, including Telegram bots, Valorant hacking utilities, Instagram automation scripts, and Bitcoin wallet managers.

To evade detection, attackers meticulously craft README.MD files in multiple languages, complete with installation guides, usage examples, and troubleshooting tips.

For example, a Python-based “Instagram follower bot” repository included step-by-step instructions for configuring API keys—a tactic meant to build trust before deploying malware.

Attackers used AI to write detailed instructions in multiple languages

Automated Commit Spoofing

Attackers automated repository activity by generating timestamp-based commits every few minutes, creating the illusion of active maintenance.

One repository logged over 12,000 commits in six months, mimicking the update patterns of legitimate open-source projects.

This strategy helped malicious repositories evade GitHub’s default “sorted by recently updated” filters, pushing them higher in search results.

Malware Payloads and Financial Impact

GitVenom’s repositories span Python, JavaScript, C, C++, and C#, broadening their attack surface. Malicious payloads include:

  • Node.js Stealer: Harvests usernames, passwords, browser history, and cryptocurrency wallet data, compresses it into a .7z archive, and exfiltrates it via Telegram bots.
  • AsyncRAT: An open-source RAT enabling keylogging, screen capture, and remote command execution.
  • Clipper Malware: Scans clipboards for cryptocurrency addresses and substitutes them with attacker-controlled wallets. In November 2024, one wallet linked to this campaign received a single 5 BTC transfer.

Victims span Russia, Brazil, Turkey, and Southeast Asia, with lures tailored to regional developer interests.

Brazilian repositories promoted “CPF generators” (national ID tools), while Turkish repos advertised VPN bypass tools for streaming platforms.

Experts recommend manually reviewing code dependencies before integration, particularly for projects lacking two-factor authentication (2FA) among contributors.

Attackers frequently used single-contributor accounts created days before repository publication.

  • Audit Stars and Forks: Legitimate projects typically accrue organic engagement over time. A repository with 200 stars but only two forks may indicate bot activity.
  • Monitor Direct Links: Avoid downloading repositories shared via unsolicited messages or unverified forums. Attackers often use URL shorteners to mask GitHub links.

The GitVenom campaign underscores the escalating risks of supply chain attacks in open-source ecosystems.

As threat actors refine their social engineering tactics, developers must adopt defensive practices—from rigorous code audits to endpoint protection tools.

GitHub has removed the identified repositories, but researchers warn copycat campaigns are inevitable.

Vigilance remains the cornerstone of cybersecurity in an era where malicious innovation outpaces traditional defenses.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...