Wednesday, February 8, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Researchers find fake PoC GitHub repositories spreading malware

Researchers find fake PoC GitHub repositories spreading malware

Researchers announced that they have detected thousands of repositories on GitHub, offering fake PoCs to spread malware.


Erdem Yasar Erdem Yasar
October 24, 2022
4 min read
Researchers find fake PoC GitHub repositories spreading malware
  • Researchers of the Leiden Institute of Advanced Computer Science stated that there are thousands of fake PoCs in GitHub repositories.
  • During the binary analysis, the team examined 6,160 executables. The results show that 2,164 malicious samples are found in 1,398 repositories.
  • The team also found a link in a repository to Pastebin that will be saved as a VBScript, then run by the first exec command, which contains the Houdini malware.

Researchers of the Leiden Institute of Advanced Computer Science announced the results of their research. According to the report, there are thousands of GitHub repositories that are offering fake proof-of-concept exploits. Some of them are even including malware. The researchers analyzed approximately 47,000 repositories between 2017 and 2021.

Spreading malware

The researchers started with observations about some indicators of malicious PoCs and what kind of methods are being used in these PoCs and what are well-known and easy-to-implement methods can be used in order to create a malicious PoC for a specific CVE exploit. Then the team clustered the data based on programming language as well as the year of CVE, which will be useful in similarity analysis and o identifying useful indicators of maliciousness and extracting them from PoCs and repositories. The team identified the indicators of malicious PoCs:

  • IP analysis: As PoCs are intended to be used by different people on different machines, in general, a PoC should not have any communications with a predetermined public IP address. This could be an indication of malicious behavior, e.g., to exfiltrate information from the machine executing the PoC to that server. 
  • Binaries analysis: Some PoC repositories come with pre-built binaries to ease the process of exploiting a given security issue. This is why the team also extracts binaries from the repositories. In this work, the team focused on EXE files which can be run on Windows systems, since also most of the malware attacks are conducted against Windows users. 

2,864 of the 150,734 unique IPs extracted matched blocklist entries. 1,522 of them are detected as malicious on Virus Total and 1,069 of them are present in the AbuseIPDB database. During the binary analysis, the team examined 6,160 executables. The results show that 2,164 malicious samples are found in 1,398 repositories. In total, 47,313 repositories were tested and 4.893 of them were deemed malicious.

The team also found various malicious proof of concepts made for CVEs. These PoCs have had multiple intentions: some of them contain malware, some are used to gather information about users of the PoC, and others are made to simply mock people and remind them that running proof of concepts without reading the code can be harmful.

  • Malware: One interesting example was shared in the repository, intended to be a PoC for CVE-2019-0708, which is the famous BlueKeep. This repository was created by a user under the name Elkhazrajy. The source code contains a base64 line that once decoded will be running. It contains another Python script with a link to Pastebin that will be saved as a VBScript, then run by the first exec command, which contains the Houdini malware.
  • Exfiltration scripts: These scripts were generally made to gather some information about the person running it, e.g., IP address, system information, User agent, IPbased geolocation, etc. One example was the malicious PoC made to exfiltrate a few basic details about the machine running it.
  • Prank scripts: Fake but not malicious, these scripts are made generally by people who are aware of the issue and trying to educate the rest of the community by sharing prank scripts that, once running, will either show a prank message or something else.

The researchers said,

« We conduct a quantitative and qualitative investigation of CVE Proof of Concepts maliciousness on GitHub. In this research we proposed heuristics to detect malicious PoCs based on inclusion of malicious IP addresses, analysis of instructions obfuscated with hexadecimal and base64 encodings, and malicious binaries targeting Windows systems. Out of 47313 GitHub repositories with PoCs we detected 4893 malicious repositories (i.e., 10.3%). The next step after this research is to develop a more robust approach to for detecting malicious instructions, e.g., based on code similarity features or dynamic analysis. 

To the best of our knowledge, our work is the first that investigates, analyses and proposes a heuristic-based solution to detect and flag malicious PoCs of CVEs. Our approach is based on analysing source code for malicious calls to servers as well as extracting hexadecimal payloads and Base64 encoded scripts that contains malicious instructions, which could be exfiltrating information, downloading malicious files from the internet or containing a backdoor. However, this approach cannot detect every malicious PoC based on source code, since it is always possible to find more creative ways to obfuscate it. We have investigated code similarity as a feature to help identifying new malicious repositories. Our results show that indeed malicious repositories are on average more similar to each other than non-malicious one. This result is the first step to develop more robust detection techniques. »

See more Cybersecurity News


Tags: GitHub
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7 News. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7 News, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
ManageEngine introduces cloud cost management capabilities for Azure

ManageEngine introduces CloudSpend for Azure

Related News

CISA publishes VMware ESXi ransomware recovery tool

CISA publishes VMware ESXi ransomware recovery tool

February 8, 2023 3:45 pm
New local privilege escalation vulnerability strikes X.Org server

New local privilege escalation vulnerability strikes X.Org server

February 7, 2023 9:45 pm
Red Hat brings new security capabilities to Red Hat OpenShift

Red Hat brings new security capabilities to Red Hat OpenShift

February 7, 2023 8:55 pm
Cisco fixes command injection vulnerability

Cisco fixes command injection vulnerability

February 6, 2023 5:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • CISA publishes VMware ESXi ransomware recovery tool
  • WordPress 6.2 Beta is ready for testing
  • New local privilege escalation vulnerability strikes X.Org server
  • Red Hat brings new security capabilities to Red Hat OpenShift
  • With BuddyPress 12.0, BP Rewrites will support backward compatibility

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.