Kaspersky official blog 2024年07月06日
Hijacking GitHub accounts using phishing emails | Kaspersky official blog
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

近期,黑客利用 GitHub 的合法电子邮件地址发送钓鱼邮件,以招聘高薪职位为诱饵,诱骗开发者授权恶意 OAuth 应用程序,从而获取其账户权限,清空其代码库,并勒索赎金。这起攻击事件对企业信息安全构成严重威胁,尤其是当开发者拥有公司相关代码库的管理权限时。

👨‍💻 黑客利用 GitHub 的合法电子邮件地址 notifications@github.com 发送钓鱼邮件,以招聘高薪职位为诱饵,诱骗开发者授权恶意 OAuth 应用程序。

🔐 邮件内容看似来自 GitHub 官方招聘团队,但实际上是黑客伪造的,邮件主题与招聘内容不符,邮件地址也存在异常。

🗑️ 开发者一旦授权恶意 OAuth 应用程序,黑客将清空其代码库,并将所有代码库重命名,只留下一个包含勒索信息的 README.me 文件。

💰 黑客在 README.me 文件中留下联系方式,要求受害者支付赎金以恢复数据。

⚠️ 黑客利用 GitHub 的讨论系统发送钓鱼邮件,利用已泄露的账户在各种主题下创建带有钓鱼邮件内容的消息,并将多个用户标记为收件人。

🛡️ 为防止开发者成为此类攻击的受害者,建议开发者仔细检查邮件内容,不要点击邮件中的链接,不要授权未知的 OAuth 应用程序,定期检查已授权的 OAuth 应用程序列表。

🏢 企业应使用可靠的安全解决方案,对所有设备进行钓鱼攻击防护,定期对员工进行信息安全培训,并使用互动式教育平台提升员工的安全意识。

We recently wrote about how attackers have learned to use legitimate social media infrastructure to deliver plausible-looking warnings about the blocking of business accounts, leading to password theft. It turns out that for several months now, a very similar method has been used to attack developer accounts on GitHub, which is a cause for concern for corporate information security teams (especially if developers have administrative access to corporate related repositories on GitHub). Let’s explore how this attack works.

GitHub account hijacking

Victims of this attack receive emails sent from a genuine GitHub email address. The emails claim that the GitHub team is looking for an experienced developer and offering attractive conditions — $180,000 per year plus a generous benefits package. If interested in the position, the recipient is invited to apply via a link.

The attack begins with an email: GitHub is supposedly seeking a developer for a $180,000 annual salary. Source

These emails do come from notifications@github.com, which really belongs to the service. However, an astute recipient might wonder why the HR team is using the notification address for job offers. They might also be puzzled that the email subject has nothing to do with the job offer, and instead ends with a list of several GitHub usernames.

However, the email’s authors send it out en masse, so they probably aren’t too worried about losing a few potential targets here. The attackers are satisfied with the small number of recipients who’ll be too distracted by the salary to notice the discrepancies.

Clicking the link in the email takes the recipient to a page that pretends to be the GitHub career site. Specifically, the addresses githubtalentcommunity[.]online and githubcareers[.]online have been used in this campaign — but these phishing sites are no longer available.

On the linked site, recipients are asked to authorize a malicious OAuth application. Source

On the site, developers interested in the position are asked to log in to their GitHub account and authorize a new OAuth application. This application requests numerous permissions — including access to private repositories, personal data, and discussions, as well as the ability to delete any repository managed by the targeted user.

The OAuth application requests a number of dangerous permissions. Source

Besides job offers, another type of email has been observed, claiming that GitHub had been hacked and the GitHub security team requires the user’s authorization to eliminate the consequences of the hack.

Phishing email variant warning of a GitHub hack. Source

The next thing: repository wipe and ransom demand

If an inattentive developer grants the malicious OAuth application all the requested permissions, the attackers begin exploiting them. They empty all the victim’s repositories and then rename them — leaving behind only a single README.me file.

Hijacked and emptied repositories on GitHub with ransom notes left by the attackers. Source

The file contains a message stating that the data has been compromised, but that a backup has been made. To restore the data, the victim is instructed to contact a user named Gitloker on Telegram.

It appears that these emails are sent using the GitHub discussion system. That is, the attackers use already compromised accounts to create messages with the email text under various topics, tagging several users. As a result, all the tagged users receive emails from the notifications@github.com address. These messages are likely deleted immediately after sending.

How to protect against such attacks on GitHub accounts

Experienced users and developers often consider themselves to be immune to phishing attacks. However, as this story shows, they can also be caught off guard: the operators of this phishing campaign have already managed to compromise and wipe dozens of repositories.

To prevent your developers from falling victim to this attack, give them the following recommendations:

We recommend the following to companies:

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

GitHub 钓鱼攻击 OAuth 代码库 信息安全
相关文章