
Fake GitHub Repositories Used to Target Developers
Hacker groups have recently adopted a new tactic in their ongoing pursuit of cryptocurrency theft: using fake GitHub repositories to target blockchain developers. According to Kaspersky’s Securelist, these repositories seem entirely legitimate at first glance but actually contain malicious code designed to compromise a developer’s crypto wallet data and other sensitive information.
The repositories are so convincing that they appear as real projects with actual code written in multiple programming languages such as Python, C, C++, JavaScript, and C#. It is crucial for developers to be vigilant when running third-party code since GitHub is widely used by millions of developers worldwide, making it challenging to differentiate between authentic and malicious repositories.
In one instance, the fake repository claims to be a Telegram bot that interacts with Bitcoin wallets. However, this “bot” contains malware that drains a developer’s wallet without their knowledge or consent. The infection vector is likely quite efficient, which is why Securelist expects hackers to continue using this tactic possibly with slight modifications in tactics, techniques, and procedures (TTPs).
The advice from the researchers is for developers to exercise extreme caution when running third-party code.