Article Details
Scrape Timestamp (UTC): 2025-02-25 19:45:54.026
Original Article Text
Click to Toggle View
GitVenom attacks abuse hundreds of GitHub repos to steal crypto. A malware campaign dubbed GitVenom uses hundreds of GitHub repositories to trick users into downloading info-stealers, remote access trojans (RATs), and clipboard hijackers to steal crypto and credentials. According to Kaspersky, GitVenom has been active for at least two years, targeting users globally but with an elevated focus on Russia, Brazil, and Turkey. "Over the course of the GitVenom campaign, the threat actors behind it have created hundreds of repositories on GitHub that contain fake projects with malicious code – for example, an automation instrument for interacting with Instagram accounts, a Telegram bot allowing to manage Bitcoin wallets, and a hacking tool for the video game Valorant," describes Kaspersky's Georgy Kucherin. The researcher explains that the fake repositories are crafted with care, featuring details and appropriately written readme files, likely with the help of AI tools. Moreover, the threat actors employ tricks to artificially inflate the number of commits submitted to those repositories, creating a fake image of high activity and increasing credibility. Malware in GitHub projects Kaspersky's analysis of multiple repositories supporting the GitVenom campaign revealed that the malicious code injected into the projects is written in various languages, including Python, JavaScript, C, C++, and C#. Different languages are believed to be used to evade detection by specific code-reviewing tools or methods. Once the victim executes the payload, the injected code downloads the second stage from an attacker-controlled GitHub repository. Kaspersky found the following tools used in GitVenom: The report highlights one case from November 2024 when the attacker's Bitcoin wallet received 5 BTC, valued at half a million USD. Staying safe from this campaign Although malware hiding in GitHub repositories under the guise of regular software or even PoC exploits isn't new, GitVenom's duration and size prove that legitimate platform abuse continues to be very effective. It is crucial to thoroughly vet a project before using any of its files by inspecting repository contents, scanning files with antivirus tools, and executing downloaded files in an isolated environment. Red flags include obfuscated code, unusual automated commits, and excessively detailed Readme files that appear AI-generated.
Daily Brief Summary
Malware campaign called GitVenom uses GitHub to distribute info-stealers, RATs, and clipboard hijackers.
Targets primarily focus on users in Russia, Brazil, and Turkey, exploiting hundreds of fake GitHub repositories.
Malicious GitHub projects include fake software tools like Instagram automation tools, Bitcoin wallet managers, and hacking utilities for games.
These repositories appear credible by using well-crafted Readme files, possibly AI-generated, and inflated commit histories.
Kaspersky identifies various programming languages used in the campaign, such as Python, JavaScript, C, C++, and C#, to avoid detection.
Once executed, the injected code downloads further malicious payloads hosted on GitHub.
In one instance, attackers gained 5 BTC, worth approximately $500,000, showcasing significant financial impact.
Recommendations for safety include thorough vetting of GitHub projects, using antivirus programs, and isolating execution environments to prevent malware infection.