A sophisticated malware campaign dubbed “GitVenom” has exploited GitHub’s open-source ecosystem to distribute malicious code through thousands of fraudulent repositories, targeting developers seeking automation tools, cryptocurrency utilities, and gaming hacks. The campaign, active since at least 2023, employs advanced social engineering tactics to disguise malicious payloads as legitimate projects, compromising systems globally with cryptocurrency stealers and remote access trojans. The attackers created hundreds of GitHub repositories containing fake projects for Instagram automation bots, Bitcoin wallet managers, and Valorant hacking tools. As GitHub reviews reportedly missed these repositories for years, the incident shows the need for platform-level static analysis tools to complement user vigilance. These repositories featured professionally designed README.md files with installation instructions, version histories, and tags like “Blockchain” or “Steam API” to appear credible. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 25 Feb 2025 18:50:19 +0000