You are here: Home » NewsFeeds » GitHub Repository Owners Targeted By Data-Stealing Malware

GitHub Repository Owners Targeted By Data-Stealing Malware

“Phishing emails zeroing in on developers who own Github repositories were infecting victims with malware capable of stealing data through keyloggers and modules that would snag screenshots,” writes ThreatPost. An anonymous reader quotes their report:
Researchers at Palo Alto Networks this week said that in mid-January, an unknown number of developers were targeted with emails purporting to be job offers. The attachments instead carried malicious .doc files containing an embedded macro. The macro executed a PowerShell command that would grab malware from a command and control site and execute it… [Senior threat researcher Brandon] Levene said it’s unknown how widespread the January campaign was or why developers were targeted, but given the vast number of projects hosted on the platform, it would likely be an attractive target for either criminals and nation-state attackers.

Levene said the PowerShell script drops a binary named Dimnie, which has been around since 2014 but before


 

Original article