Thursday, April 18, 2024

Hackers Abusing GitHub Infrastructure To Mine Cryptocurrency

The IT service management portal, GitHub, is actively reviewing a series of attacks, as the threat actors are rigorously abusing the infrastructure and the servers of GitHub to mine cryptocurrency. 

However, it’s not the first time when GitHub was attacked or abused, as this kind of activity was being reported since the end of 2020.

According to the report, hackers are abusing one of the well-known features of GitHub to mine. This feature generally enables the users to automatically administer all its required tasks and workflows after an event take place inside the GitHub repositories.

Forking a Legitimate Repository

After investigating the whole matter, the Dutch security engineer Justin Perdok pronounced in a report that the threat actors had attacked the GitHub infrastructure to mine cryptocurrency.

The attacks that have been initiated by the threat actors initially involves the separation of the legitimate repository, which was enabled through GitHub actions.

After enabling the GitHub actions, the hackers now injects all kind of malicious code in a separated version. Soon after, the threat actors file a pull request for the primary repository maintainers so that the hackers can later merge the code back.

Hackers Abusing GitHub’s Own servers 

Apart from this, the hackers have nearly collected up to 100 crypto-miners only with one attack, as reported by the Dutch security engineer Justin Perdok.

Hackers were using strong methods that are putting large influence on GitHub; that’s why the attacks were creating large computational loads that were becoming hard to handle for GitHub’s infrastructure.

However, Justin Perdok asserted that the attackers were still anonymous, and the attacks that were being initiated by the hackers were occurring at a random scale.

After a proper investigation, Justin Perdok recognised that one account is creating hundreds of Pull Requests that are containing malicious code.

But, GitHub was aware of this activity, and they are still actively investigating the attacks; and soon, they will publish further detailed information on the matter.  

As we said above that this isn’t the first time when GitHub gets abused, and there is not only GitHub, as there are many other companies that have encountered such attacks. That’s why GitHub is still investigating the attack to know all its core information.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles