A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub
Jul 26, 2024
auto_awesome
A clandestine network on GitHub controlled by Stargazer Goblin is spreading ransomware and info stealers, luring users with popular downloads that actually contain malicious software. The tactics of the hacker 'ghost' network include automated searches for linked accounts, fictitious reviews, and GitHub's countermeasures involving manual reviews and machine learning algorithms.
A network of ghost accounts on GitHub is spreading ransomware and info stealers discreetly.
Cybercriminals exploit GitHub's user base by using fake stars and hidden malicious code.
Deep dives
Spread of Malware on GitHub
A network of around 3,000 ghost accounts on GitHub has been discreetly manipulating the platform to spread ransomware and infostealers. Checkpoint researchers discovered a cybercriminal named Stargazer Goblin hosting malicious code repositories on GitHub, using false accounts to make these pages popular. The network's operations include sharing various ransomware and malware tools, posing as legitimate software downloads targeting Windows users. The network employs tactics like buying and selling repositories on criminal marketplaces, aiming to capitalize on users searching for free software.
GitHub Cyber Threats and Detection
Cybercriminals exploit GitHub's large user base and open platform, using tactics like fake stars and hidden malicious code. Researchers have observed supply chain attacks and malware spreading through comments on the platform. One threat actor, Stargazer Goblin, advertises services through cybercrime forums and telegram, offering fake stars and repository clones. GitHub faces the challenge of identifying malicious activity, with the threat actor likely automating actions to appear genuine. Security experts advise users to watch for suspicious code changes, access to external resources, and unexpected credentials while browsing on GitHub.