Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social platforms like Twitter and GitHub.
While hackers are doing so to spread fake proof-of-concept exploits for the vulnerabilities that are Zero-day in nature and capable of infecting both most used operating systems:-
Alleged experts affiliated with a fraudulent cybersecurity company, ‘ High Sierra Cyber Security,’ are actively spreading these malicious exploits.
Hackers’ primary focus is on cybersecurity researchers and companies actively participating or involved in vulnerability research.
The repositories appear legitimate, with the individuals responsible for them masquerading as actual security experts from renowned security companies like ‘Rapid7.’
Not only that, but they also utilize the pictures of these security professionals to further their deception, based on the report from VulnCheck.
To give their research and code repositories on platforms like GitHub a sense of legitimacy, the same personas also manage Twitter accounts.
Additionally, they exploit social media to lure unsuspecting victims into their traps.
Since May 2023, this malicious campaign has been ongoing and actively promoting zero-day vulnerabilities for the renowned and most used apps, which include:-
Across all instances, the malicious repositories contain a Python script named ‘poc.py,’ here this script serves as a means of downloading malware on the following systems:-
The script connects with a distinct website to retrieve a ZIP file, subsequently downloading it onto the targeted computer.
The choice of the appropriate file is contingent upon the operating system currently in place. As here, both Linux and Windows users get the same file but with different names that we have mentioned below:-
Here below we have mentioned the storage directories or locations of the malware:-
The Windows binary inside the ZIP file (‘cves_windows.exe’) raises concerns among more than 60% of antivirus engines on VirusTotal, indicating its potential risk.
Unlike its Windows counterpart, the Linux binary (‘cves_linux’) shows a greater level of stealthiness, managing to evade detection from most of the scanners, as three antivirus scanners managed to detect it.
The exact nature of the installed malware remains uncertain, but both executables install a TOR client. Besides this, the Windows edition is recognized as a trojan with the ability to steal passwords.
Here below, we have mentioned the malicious repositories that should be avoided:-
Here below, we have mentioned all the fake Twitter accounts that should be avoided:-
Here below, we have mentioned all the fake GitHub accounts that should be avoided:-
Looking For an All-in-One Multi-OS Patch Management Platform –
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. …
INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase widely…
Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…
A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…
Recent research has linked a series of cyberattacks to The Mask group, as one notable…
RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…