Kaspersky Global Research & Analysis Team (GReAT) discovered hundreds of open source repositories with multistaged malware targeting gamers and cryptoinvestors within a new campaign that was dubbed by Kaspersky as GitVenom. The infected projects include an automation instrument for interacting with Instagram accounts, a Telegram bot that enables the remote management of Bitcoin wallets and a crack tool to play the Valorant game. All of this alleged project functionality was fake, and cybercriminals behind the campaign stole personal and banking data and hijacked cryptowallet addresses from the clipboard. As a result of the malicious activity cybercriminals were able to steal 5 Bitcoins (around $485,000 at the time of investigation). Kaspersky detected the use of the infected repositories worldwide, with most cases in Brazil, Turkiye, and Russia.
These repositories
have been stored on GitHub, a platform that allows developers to manage and
share their code, for several years. The attackers strived to make the
repositories on GitHub appear legitimate to potential targets by using
attractive project descriptions that have likely been generated with AI. If the
code from these repositories was launched, the victim’s device would become
infected with malware and could be remotely controlled by the attackers.
While the projects were written in multiple programming languages – Python, JavaScript, C, C++ and C# – the malicious payloads stored inside the infected projects had the same goal: to download other malicious components from an attacker-controlled GitHub repository and execute them. These components include a stealer that collects passwords, bank account information, saved credentials, cryptocurrency wallet data and browsing history, packs it into a .7z archive and uploads it to attackers via Telegram.
Structure of the archive which the stealer
sends to attackers
Other downloaded
malicious components include remote administration tools that can be used to
remotely monitor and control a victim’s computer through a secure encrypted
connection, and a clipboard hijacker which searches the clipboard contents for
cryptocurrency wallet addresses and replaces them with attacker-controlled
ones. Notably, the attacker-controlled Bitcoin wallet received a sum of about 5
BTC (approximately $485,000 at the time of research) in November 2024.
“As code sharing platforms such as GitHub are used by millions of
developers worldwide, threat actors will certainly continue using fake software
as an infection lure in the future. For that reason, it is crucial to handle
processing of third-party code very carefully. Before attempting to run such
code or integrate it into an existing project, it is paramount to thoroughly
check what actions are performed by it. This way, it will be very easy to spot
fake projects and prevent malicious code placed in them from being used to
compromise the development environment,” comments Georgy Kucherin,
Security Researcher at Kaspersky GReAT.
Read more on Securelist.com.
About the Global Research &
Analysis Team
Established in 2008,
Global Research & Analysis Team (GReAT) operates at the very heart of
Kaspersky, uncovering APTs, cyber-espionage campaigns, major malware,
ransomware and underground cyber-criminal trends across the world. Today GReAT
consists of 35+ experts working globally – in Europe, Russia, Latin America,
Asia and the Middle East. Talented security professionals provide company
leadership in anti-malware research and innovation, bringing unrivaled
expertise, passion and curiosity to the discovery and analysis of cyberthreats.