Application security, Phishing, Supply chain
GitHub phishing campaign wipes repos, extorts victims

(Credit: Ahmed – stock.adobe.com)
GitHub users are being targeted by a phishing and extortion campaign that leverages the site’s notification system and a malicious OAuth app to swindle victims.A GitHub Community discussion opened in February shows that campaign has been ongoing for nearly four months, with a social media post by CronUp Security Researcher Germán Fernández shedding new light on the scam last week.Targets are roped into the scam when their username is mentioned (i.e. tagged) in a comment, which triggers an email to be sent to them from [email protected], a legitimate GitHub email address.The comments left by the attacker are designed to appear like an email from GitHub staff, and an unsuspecting user who receives the notification email may not realize they are reading the contents of a comment they were mentioned rather than an email sent directly from GitHub. Screenshots from GitHub Community discussions show the only signs that the email originates from a comment they were tagged in are the subject line, which begins with “Re:”, and a line at the bottom of the email that states, “You are receiving this because you were mentioned.”The phishing comments purport to be from GitHub staff offering the user a job or alerting the user to a supposed security breach. The comments include a link to websites resembling GitHub domains, including githubcareers[.]online and githubtalentcommunity[.]online, which leads targets to a prompt to give an external app certain access and control over their account and repositories via OAuth.If this request is approved, the attacker wipes the contents of the user’s repos and replaces them with a README file directing the user to contact a user called “gitloker” on Telegram in order to recover their data. The Gitloker threat actor also uses compromised accounts to post more comments triggering more phishing emails, putting the victims’ accounts in danger of deletion due to other users reporting the scam.“Threat actors spoofing legitimate companies in order to gain access to content is nothing new, however, it is unusual for threat actors to go to such lengths in order to obtain access. What is even more unusual is that after the threat actors obtain access, they appear to only use the accounts for extortion rather than performing more advanced actions like uploading malware to the repos to infect more people,” said Max Gannon, cyber intelligence team manager at Cofense, in an email to SC Media.Gannon noted that Gitloker claims to have made copies of the data and may also be looking for credentials and vulnerabilities, but also might be a low-skill attacker looking for a quick buck through their extortion scheme. Regardless, the Gitloker attacks demonstrate the potential for supply chain attacks via GitHub and “reinforces the fact that companies need to keep track of whose code they use and if the sources for the code have been compromised,” Gannon said.Fernández’s post includes more evidence of other extortion scams tied to the Gitloker telegram, including one from April threatening to leak confidential information allegedly found in an organization’s GitHub repos if a $250,000 payment isn’t made, and another from early February demanding $1,000 within 24 hours to prevent the exposure of data from an unspecified compromised source.
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds