Newsinterpretation

Hackers Hide GitVenom Malware in Fake GitHub Repositories

Cybercriminals are using a sneaky new method to trick developers into downloading dangerous malware. A recent campaign called GitVenom is spreading harmful software through fake GitHub repositories. These attackers create fake open-source projects that look real but secretly contain hidden threats.

Open-source projects are widely used by developers worldwide. They provide useful code that saves time and effort. However, hackers are taking advantage of this by creating fake repositories that appear legitimate. These repositories offer tools like Instagram automation software, a Telegram Bitcoin wallet bot, and a Valorant hacking tool. But instead of providing useful programs, they install malware that steals sensitive information.

The people behind this campaign are carefully disguising their fake projects. They write detailed descriptions, add many keywords, and even manipulate timestamps to make their repositories look active and trustworthy. Some descriptions might even be written with the help of AI, making them seem even more convincing.

How the GitVenom Malware Works

The GitVenom malware is hidden inside different types of programming languages, including Python, JavaScript, C, C++, and C#. The attackers use unique methods to hide the harmful code in each language.

  • Python Projects: The malware is concealed within thousands of tab characters in a script file. When executed, these tabs reveal and run a second hidden script that installs the malware.
  • JavaScript Projects: The malicious code is included inside functions hidden in the main file, waiting to be executed.
  • C, C++, and C# Projects: These projects use hidden batch scripts inside Visual Studio project files. When a developer builds the project, the malware gets activated.

Once the infected code is run, it downloads additional harmful programs from a hacker-controlled GitHub repository. These programs include an information stealer designed to grab important data like passwords, banking details, cryptocurrency wallet information, and browsing history. The stolen data is then sent to the attackers via Telegram.

Hackers Gain Control and Steal Cryptocurrency

In addition to stealing personal data, GitVenom can also take control of a victim’s computer. The malware downloads remote administration tools like AsyncRAT and Quasar RAT, which allow hackers to control infected devices remotely. This means they can steal files, track activities, and even manipulate system settings without the user knowing.

One of the most dangerous tools used in this attack is a clipboard hijacker. This sneaky program monitors copied cryptocurrency wallet addresses and replaces them with the hacker’s wallet address. If a victim tries to send cryptocurrency, the money is unknowingly sent to the attacker instead. One Bitcoin wallet linked to GitVenom has received around 5 BTC (worth $485,000) as of November 2024.

The GitVenom campaign has been active for at least two years, affecting developers worldwide. Most infection attempts have been seen in Russia, Brazil, and Turkey, but the threat is global. As long as open-source platforms like GitHub exist, hackers will continue to find ways to exploit unsuspecting users.

Developers should be extra careful when downloading code from unknown sources. Before running any third-party code, always examine it closely to ensure it does not perform any hidden actions. Staying alert can help prevent falling victim to dangerous cyberattacks like GitVenom.

TOP 10 TRENDING ON NEWSINTERPRETATION

Remote jobs exploited in global scheme as Amazon halts 1,800 North Korea-linked applications

Amazon has recently blocked more than 1,800 job applications...

Romania hit by ransomware attack as 1,000 government computers taken offline in water authority breach

Romania’s water management authority has been hit by a...

“Democracy under siege”: Sanders warns Meta and Big Tech are buying U.S. elections to block AI rules

U.S. Senator Bernie Sanders has issued a strong warning...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

House committee releases photos from Jeffrey Epstein estate with candid and unsettling content

New photos have emerged from the estate of Jeffrey...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...

Julian Assange challenges Nobel Peace Prize award, seeks to block payment to Venezuelan opposition leader

WikiLeaks founder Julian Assange has filed a complaint against...

“This is a huge red flag”: AOC says Trump used force against cartels without sharing intelligence with Congress

The debate in Washington has intensified after strong criticism...

Food Giants Call It “Efficiency” — Workers Call It Tens of Thousands of Layoffs

The food and beverage industry experienced a very difficult...

AI Didn’t Kill Jobs — It Quietly Made Them More Valuable

Workers around the world have been worried about artificial...

Redacted Epstein files trigger backlash as AOC names DOJ and demands accountability

Representative Alexandria Ocasio-Cortez (AOC) triggered widespread attention after posting...

Kamala Harris responds to criticism over Biden’s handling of Epstein-related documents

The controversy surrounding documents linked to disgraced sex trafficker...
error: Content is protected !!
Exit mobile version