Over 3,000 GitHub accounts used by malware distribution service
Threat actors known as 'Stargazer Goblin' have created a malware Distribution-as-a-Service (DaaS) from over 3,000 fake accounts on GitHub that push information-stealing malware.
The malware delivery service is called Stargazers Ghost Network and it utilizes GitHub repositories along with compromised WordPress sites to distribute password-protected archives that contain malware. In most cases, the malware are infostealers, such as RedLine, Lumma Stealer, Rhadamanthys, RisePro, and Atlantida Stealer.
Due to GitHub being a well-known, trusted service, people treat it with less suspicion and may be more likely to click on links they find in the service's repositories.
Check Point Research discovered the operation, which says it is the first time that such an organized and large-scale scheme has been documented running on GitHub.
"The campaigns performed by the Stargazers Ghost Network and malware distributed via this service are extremely successful," explains the report by Check Point Research.
"In a short period of time, thousands of victims installed software from what appears to be a legitimate repository without suspecting any malicious intent. The heavily victim-oriented phishing templates allow threat actors to infect victims with specific profiles and online accounts, making the infections even more valuable."
GitHub 'ghosts' spreading malware
The creator of the DaaS operation, Stargazer Goblin, has been actively promoting the malware distribution service on the dark web since June 2023. However, Check Point says there's evidence it has been active since August 2022.
Stargazer Goblin established a system where they create hundreds of repositories using three thousand fake 'ghost' accounts. These accounts star, fork, and subscribe to malicious repositories to increase their apparent legitimacy and make them more likely to appear on GitHub's trending section.
The repositories use project names and tags that target specific interests like cryptocurrency, gaming, and social media.
The 'ghost' accounts are assigned distinct roles. One group serves the phishing template, another provides the phishing image, and a third serves the malware, which gives the scheme a certain level of operational resilience.
"The third account, which serves the malware, is more likely to be detected. When this happens, GitHub bans the entire account, repository, and associated releases," explains researcher Antonis Terefos.
"In response to such actions, Stargazer Goblin updates the first account's phishing repository with a new link to a new active malicious release. This allows the network to continue operating with minimum losses when a malware-serving account is banned."
Check Point has observed a case of a YouTube video with a software tutorial linking to the same operative as in one of the 'Stargazers Ghost Network' GitHub repositories.
The researchers note that it could be one of the potentially multiple examples of channels used to funnel traffic to phishing repositories or malware distribution sites.
In terms of the size of the operation and its profit generation, Check Point estimates that the threat actor has made over $100,000 since the service's launch.
As for what malware is distributed through the Stargazers Ghost Network's operation, Check Point says it includes RedLine, Lumma Stealer, Rhadamanthys, RisePro, and Atlantida Stealer, among others.
In one example attack chain presented in Check Point's report, the GitHub repository redirects visitors to a compromised WordPress site, from where they download a ZIP archive containing an HTA file with VBScript.
The VBScript triggers the execution of two successive PowerShell scripts that ultimately lead to the deployment of the Atlantida Stealer.
Although GitHub has taken action against many of the malicious and essentially fake repositories, taking down over 1,500 since May 2024, Check Point says that over 200 are currently active and continue to distribute malware.
Users arriving on GitHub repositories through malvertising, Google Search results, YouTube videos, Telegram, or social media are advised to be very cautious with file downloads and the URLs they click.
This is especially true of password-protected archives, which cannot be scanned by antivirus software. For these types of files, it is suggested you extract them on a VM and scan the extracted contents with antivirus software to check for malware.
If a virtual machine is not available, you can also use VirusTotal, which will prompt for the password of a protected archive so it can scan its contents. However, VirusTotal can only scan a protected archive if it contains a single file.
source: BleepingComputer
Free security scan for your website
Top News:
Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)
November 18, 2024CWE top 25 most dangerous software weaknesses
November 21, 2024Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
November 21, 2024Microsoft rolls out Recall to Windows Insiders with Copilot+ PCs
November 23, 2024Download: CIS Critical Security Controls v8.1
August 8, 2024Hackers now use AppDomain Injection to drop CobaltStrike beacons
August 24, 2024