Wednesday, August 17, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Hackers cloning GitHub repositories with malware

Hackers cloning GitHub repositories with malware

A software developer claimed that he discovered a malware campaign that affects more than 35,000 repositories on GitHub.


Erdem Yasar Erdem Yasar
August 4, 2022
2 min read
Hackers cloning GitHub repositories with malware
  • Software developers stated that they found a malicious URL and a backdoor in over 35.000 copied repositories on GitHub.
  • GitHub is removing projects that include malware and stated that clones were quarantined and there was no evident compromise of GitHub.
  • Malware can allow attackers to steal API keys, credentials, and crypto keys or even execute arbitrary codes by using the backdoor.

Stephen Lacy, a software developer, claimed that more than 35,000 GitHub repositories were copied with clones, which include malware. Cloning open-source repositories is not something new, however, sometimes hackers can create copies of legitimate projects to include their malware, which is a common way to spread malware to thousands of projects quickly. Shortly after the developer’s tweet, GitHub started removing malicious repositories.

Dates back to 2015

In his tweet, Stephen Lacy referred to the situation as a “massive widespread malware attack.” He also claims that the malware is found in many projects, including crypto, golang, python, js, bash, docker, and k8s. According to the tweet, the malware is added to npm scripts, docker images, and install docs.

I am uncovering what seems to be a massive widespread malware attack on @github.

– Currently over 35k repositories are infected
– So far found in projects including: crypto, golang, python, js, bash, docker, k8s
– It is added to npm scripts, docker images and install docs pic.twitter.com/rq3CBDw3r9

— Stephen Lacy (@stephenlacy) August 3, 2022

Lacy noticed a URL in a code, which seemed suspicious:

hxxp://ovz1.j19544519.pr46m.vps.myjino[.]ru

With a simple search, Google finds over 35,000 repositories that contain a malicious URL. These repositories can be considered suspicious. Out of 35,000 repositories, over 13,000 of them are from the repository named redhat-operator-ecosystem, which is currently removed from GitHub.

Another software developer James Tucker also pinpoint another treat. He claims that the repositories that include the malicious URL also contain a backdoor. The combination of these two codes can allow attackers to steal API keys, credentials, and crypto keys. The backdoor alone is enough for attackers to execute arbitrary code.

While the majority of cloned repositories that include the malware were altered very recently, some of them date back to 2015. GitHub also published a tweet about the situation and stated that the malicious code was included only in cloned repositories, not the repositories themselves.

GitHub is investigating the Tweet published Wed, Aug. 3, 2022:
* No repositories were compromised
* Malicious code was posted to cloned repositories, not the repositories themselves
* The clones were quarantined and there was no evident compromise of GitHub or maintainer accounts

— GitHub Security (@GitHubSecurity) August 3, 2022

See more Cybersecurity News


Tags: GitHubMalware

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Samsung reveals its memory-semantic SSD for AI and ML workloads

Samsung reveals its memory-semantic SSD for AI and ML workloads

Related News

Critical Realtek vulnerability leaves networking devices at risk

Critical Realtek vulnerability leaves networking devices at risk

August 17, 2022 7:15 pm
Trend Micro warned about incomplete or faulty patches

Trend Micro warned about incomplete or faulty patches

August 17, 2022 7:00 pm
1,900 Signal users' phone numbers may be exposed

1,900 Signal users’ phone numbers may be exposed

August 16, 2022 10:05 pm
10 malicious packages found on PyPI

10 malicious packages found on PyPI

August 16, 2022 9:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the Cloud7 Newsletter

Sign up for the Cloud7 Newsletter to receive the latest IT business updates straight to your inbox daily.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Recent News

  • Deepin 23 Preview is released with atomic updates
  • Critical Realtek vulnerability leaves networking devices at risk
  • Trend Micro warned about incomplete or faulty patches
  • Proton 7.0-4 comes with support for more games
  • Cloud7 Podcast – Episode 10: Software-Defined Storage


Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.