{"id":393,"date":"2017-03-30T16:22:49","date_gmt":"2017-03-30T16:22:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/malware-campaign-targets-open-source-developers-on-github\/"},"modified":"2019-05-29T12:12:11","modified_gmt":"2019-05-29T12:12:11","slug":"malware-campaign-targets-open-source-developers-on-github","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/","title":{"rendered":"Malware campaign targets open source developers on GitHub"},"content":{"rendered":"<p class=\"wls-paragraph\">Be on your guard if you\u2019re a developer who uses GitHub \u2013 someone could be trying to infect your computer with malware.<\/p>\n<p class=\"wls-paragraph\">Reports have emerged that malicious hackers are attempting to infect open source programmers\u2019 computers with a Trojan horse, by launching a targeted malware campaign via email against GitHub developers.<\/p>\n<p class=\"wls-paragraph\">The attack, which was <a title=\"Link to Hackademix\" href=\"https:\/\/hackademix.net\/2017\/01\/27\/targeted-email-attack-against-open-source-developers\/\" rel=\"nofollow\">first noticed in January<\/a>, typically arrives in the form of a flattering email offering programming work:<\/p>\n<blockquote><p>Hey. I found your software is online. Can you write the code for my project? Terms of reference attached below.<br \/>\nThe price shall discuss, if you can make. Answer please.<\/p><\/blockquote>\n<p class=\"wls-paragraph\">Other, more recent sightings, have seen the attackers be a little less curt in their approach:<\/p>\n<blockquote><p>Hello,<\/p>\n<p class=\"wls-paragraph\">My name is Adam Buchbinder, I saw your GitHub repo and i\u2019m pretty amazed. The point is that i have an open position in my company and looks like you are a good fit.<\/p>\n<p class=\"wls-paragraph\">Please take a look into attachment to find details about company and job. Dont hesitate to contact me directly via email highlighted in the document below.<\/p>\n<p class=\"wls-paragraph\">Thanks and regards,<br \/>\nAdam.<\/p><\/blockquote>\n<p class=\"wls-paragraph\">Hungry programmers, keen to keep themselves in a steady supply of pizza and Jolt cola, and flattered by the praise, may find it only too tempting to click on the poisoned attachment in the belief that they are being offered some genuine work.<\/p>\n<p class=\"wls-paragraph\">The attached file, which is in an archive format, has been seen to contain a boobytrapped Word document designed to install further malicious code onto its victim\u2019s PC.<\/p>\n<p class=\"wls-paragraph\">The malware, <a title=\"Link to Palo Alto Research blog\" href=\"http:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/unit42-dimnie-hiding-plain-sight\/\" rel=\"nofollow\">called Dimnie by Palo Alto researchers<\/a>, is detected by ESET security products as VBA\/TrojanDownloader.Agent.CLB.<\/p>\n<p class=\"wls-paragraph\">If it successfully manages to infect a target\u2019s computer, the Trojan can spy upon the PC\u2019s activity \u2013 logging keystrokes, taking screenshots, and stealing information. Someone unknown is now spying on the activities of a programmer working on open source software, potentially stealing their passwords and perhaps meddling with the open source code that is being published online.<\/p>\n<p class=\"wls-paragraph\">What makes this latest version of the Dimnie Trojan more sophisticated is its sophisticated methods of camouflaging its behaviour, in an attempt to avoid its suspicious data exfiltration being picked up by security products which might be running on the coder\u2019s network.<\/p>\n<p class=\"wls-paragraph\">In a final flourish of panache, the Trojan is even capable of self-destructing, destroying evidence that it was ever present on the developer\u2019s PC.<\/p>\n<p class=\"wls-paragraph\">Speculation is sure to mount as to the motivations of whoever is targeting developers who use GitHub, but it seems likely that the masterminds of this attack are doing so to gather information and perhaps steal credentials that could help them access other businesses for whom the developers may be working. Furthermore, we shouldn\u2019t dismiss the possibility that the attackers are interested in secretly introducing weaknesses into coding projects under the guise of a trusted, legitimate programmer.<\/p>\n<p class=\"wls-paragraph\">These targeted attacks are a healthy reminder to all computer users \u2013 however technical \u2013 that they should always think twice about clicking on unsolicited attachments.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/03\/30\/malware-campaign-targets-open-source-developers-github\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Be on your guard if you\u2019re a developer who uses GitHub \u2013 someone could be trying to infect your computer with malware. Reports have emerged that malicious hackers are attempting to infect open source programmers\u2019 computers with a Trojan horse, by launching a targeted malware campaign via email against GitHub developers. The attack, which was<\/p>\n","protected":false},"author":5,"featured_media":1800,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[160,165],"tags":[],"class_list":["post-393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malware campaign targets open source developers on GitHub - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware campaign targets open source developers on GitHub\" \/>\n<meta property=\"og:description\" content=\"Be on your guard if you\u2019re a developer who uses GitHub \u2013 someone could be trying to infect your computer with malware. Reports have emerged that malicious hackers are attempting to infect open source programmers\u2019 computers with a Trojan horse, by launching a targeted malware campaign via email against GitHub developers. The attack, which was\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-30T16:22:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:12:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/github-malware-623x425.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Malware campaign targets open source developers on GitHub\",\"datePublished\":\"2017-03-30T16:22:49+00:00\",\"dateModified\":\"2019-05-29T12:12:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/\"},\"wordCount\":513,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/github-malware-623x425.jpeg\",\"articleSection\":[\"malware\",\"phishing\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/\",\"name\":\"Malware campaign targets open source developers on GitHub - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/github-malware-623x425.jpeg\",\"datePublished\":\"2017-03-30T16:22:49+00:00\",\"dateModified\":\"2019-05-29T12:12:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/github-malware-623x425.jpeg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/github-malware-623x425.jpeg\",\"width\":623,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware campaign targets open source developers on GitHub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/03\\\/30\\\/malware-campaign-targets-open-source-developers-on-github\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware campaign targets open source developers on GitHub - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/","og_locale":"en_US","og_type":"article","og_title":"Malware campaign targets open source developers on GitHub","og_description":"Be on your guard if you\u2019re a developer who uses GitHub \u2013 someone could be trying to infect your computer with malware. Reports have emerged that malicious hackers are attempting to infect open source programmers\u2019 computers with a Trojan horse, by launching a targeted malware campaign via email against GitHub developers. The attack, which was","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-03-30T16:22:49+00:00","article_modified_time":"2019-05-29T12:12:11+00:00","og_image":[{"width":623,"height":425,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/github-malware-623x425.jpeg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Malware campaign targets open source developers on GitHub","datePublished":"2017-03-30T16:22:49+00:00","dateModified":"2019-05-29T12:12:11+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/"},"wordCount":513,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/github-malware-623x425.jpeg","articleSection":["malware","phishing"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/","name":"Malware campaign targets open source developers on GitHub - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/github-malware-623x425.jpeg","datePublished":"2017-03-30T16:22:49+00:00","dateModified":"2019-05-29T12:12:11+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/github-malware-623x425.jpeg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/github-malware-623x425.jpeg","width":623,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Malware campaign targets open source developers on GitHub"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/03\/30\/malware-campaign-targets-open-source-developers-on-github\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/393\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1800"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}