skip to Main Content
bitcoin
Bitcoin (BTC) $ 95,715.64 1.85%
ethereum
Ethereum (ETH) $ 3,329.71 1.82%
tether
Tether (USDT) $ 1.00 0.09%
xrp
XRP (XRP) $ 2.23 0.98%
bnb
BNB (BNB) $ 658.97 0.98%
solana
Solana (SOL) $ 182.61 2.01%
dogecoin
Dogecoin (DOGE) $ 0.315386 3.59%
usd-coin
USDC (USDC) $ 1.00 0.05%
staked-ether
Lido Staked Ether (STETH) $ 3,319.12 2.03%
cardano
Cardano (ADA) $ 0.893167 2.68%

GitHub faces widespread malware attacks affecting projects, including crypto

The developer who found the vulnerability requested developers to sign their revisions with the GPG key to ensure all their revisions on the project can be verified.

GitHub faces widespread malware attacks affecting projects, including crypto

Major developer platform GitHub faced a widespread malware attack and reported 35,000 “code hits” on a day that saw thousands of Solana-based wallets drained for millions of dollars.

The widespread attack was highlighted by GitHub developer Stephen Lucy who first reported the incident earlier on Aug. 3. The developer came across the issue while reviewing a project he found on a Google search.

I am uncovering what seems to be a massive widespread malware attack on @github.

– Currently over 35k repositories are infected

– So far found in projects including: crypto, golang, python, js, bash, docker, k8s

– It is added to npm scripts, docker images and install docs pic.twitter.com/rq3CBDw3r9

— Stephen Lacy (@stephenlacy) August 3, 2022

So far, various projects from crypto, Golang, Python, js, Bash, Docker and Kubernetes were found to be affected by the attack. The malware attack is targeted at the docker images, install docs and npm script, which is a convenient way to bundle common shell commands for a project.

To dupe developers and access critical data, the attacker first creates a fake repository (a repository contains all of the project’s files and each file’s revision history) and pushes clones of legit projects to GitHub. For example, the following two snapshots show this legit crypto miner project and its clone.

Original Crypto Mining Project Source: Github
Cloned Crypto Mining Project Source: Github

Many of these clone repositories were pushed as “pull requests.” Pull requests let developers tell others about changes they have pushed to a branch in a repository on GitHub.

Related: Nomad reportedly ignored security vulnerability that led to $190M exploit

Once the developer falls prey to the malware attack, the entire environment variable (ENV) of the script, application, or laptop (electron apps), is sent to the attacker’s server. ENV includes security keys, AWS access keys, crypto keys and much more.

The developer has reported the issue to GitHub and advised developers to GPG sign their revisions made to the repository. GPG keys add an extra layer of security to your GitHub accounts and software projects by providing a way of verifying all revisions come from a trusted source

Loading data ...
Comparison
View chart compare
View table compare
Back To Top