Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Threat actors are increasingly abusing GitHub for malicious purposes
    Cyber Security

    Threat actors are increasingly abusing GitHub for malicious purposes

    techempireBy techempire3 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 11, 2024Editorial DepartmentInternet Security/Software Security

    GitHub for malicious purposes

    GitHub’s ubiquity in information technology (IT) environments makes it a lucrative option for threat actors to host and deliver malicious payloads and serve as a dead center resolver, command and control, and data exfiltration point.

    Recorded Future said in a report shared with The Hacker News: “Using GitHub services for malicious infrastructure allows adversaries to blend into legitimate network traffic, often bypassing traditional security defenses and allowing upstream infrastructure to track and attack attackers. Attribution becomes more difficult.”

    Cybersecurity firms describe this approach as “off-the-land trusted sites” (LOTS), an extension of the living-off-the-land (LotL) technique often employed by threat actors to hide rogue activity and fly under the radar.

    The most prominent way GitHub has been abused relates to payload delivery, with some attackers exploiting its capabilities for command and control (C2) obfuscation. Last month, ReversingLabs detailed a number of rogue Python packages that relied on secret nuggets hosted on GitHub to receive malicious commands on compromised hosts.

    Internet security

    While full-fledged C2 implementations in GitHub are less common than other infrastructure options, threat actors use it as a dead center resolver (where information from actor-controlled GitHub repositories is used to obtain the actual C2 URL ) are much more common, as evidenced by cases of malware such as Drokbk and ShellBox.

    Also rarely observed is the misuse of GitHub for data exfiltration, which according to Recorded Future may be due to file size and storage limitations as well as concerns about discoverability.

    In addition to these four main scenarios, the platform’s products are used in various other ways to serve infrastructure-related purposes. For example, GitHub Pages has been used as a phishing host or traffic redirector, and some campaigns have utilized GitHub repositories as backup C2 channels.

    Internet security

    This development reflects a broader trend of legitimate web services such as Google Drive, Microsoft OneDrive, Dropbox, Notion, Firebase, Trello and Discord being exploited by threat actors. This also includes other source code and version control platforms such as GitLab, BitBucket and Codeberg.

    “There is no one-size-fits-all solution for GitHub abuse detection,” the company said. “Detection strategies require a mix of usage and are influenced by specific circumstances and factors such as log availability, organizational structure, service usage patterns and risk tolerance, etc.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.