GitHub comments used to distribute malware (BleepingComputer)
BleepingComputer reported on April 20 that some malware was being distributed via GitHub. Uploading files as part of a comment gives them a URL that appears to be associated with a repository, even if the comment is never posted.
A GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using URLs associated with Microsoft repositories, making the files appear trustworthy.
While most of the malware activity has been based around the Microsoft GitHub URLs, this "flaw" could be abused with any public repository on GitHub, allowing threat actors to create very convincing lures.
Posted Apr 24, 2024 15:16 UTC (Wed)
by wtarreau (subscriber, #51152)
[Link] (2 responses)
Maybe as a fix it could be sufficient to hash the whole URLs and only deliver cryptic hashes for these downloads so that they don't appear more trustable than any othe one. Another approach could be to prepend "unsafe-area/" in front of the repository names maybe.
Posted Apr 24, 2024 15:26 UTC (Wed)
by mbunkus (subscriber, #87248)
[Link] (1 responses)
Posted Apr 25, 2024 15:41 UTC (Thu)
by wtarreau (subscriber, #51152)
[Link]
Posted Apr 24, 2024 16:26 UTC (Wed)
by rrolls (subscriber, #151126)
[Link] (4 responses)
> The URLs for the malware installers [would appear like, for example:]
I think the "right" solution here would be to change `/microsoft/vcpkg/` to `/comments/username_of_comment_author/`, or something like that.
It's `username_of_comment_author` who controls that content, so the URL should make that clear, and not associate it with a well-known entity that isn't responsible for it.
Though, I imagine they'll have a tricky time actually implementing such a change...
Posted Apr 24, 2024 16:31 UTC (Wed)
by josh (subscriber, #17465)
[Link] (1 responses)
This seems like the right answer, yeah.
This rhymes with a previous exploit of this type: if you made a PR against a repository, you could link to files via that repository and your commit hash, and they'd look like they were part of the repository. GitHub's fix was to show a banner saying they weren't part of the repository.
Posted Apr 25, 2024 15:42 UTC (Thu)
by wtarreau (subscriber, #51152)
[Link]
Posted Apr 25, 2024 19:52 UTC (Thu)
by srdjant (guest, #171146)
[Link]
I would say it's probably just a random co-incidence, but I am not surprised that devs and maintainers are now looking carefully at their own, and other important projects for signs of attack (e.g. the ZSH Plugin Manager video from 8 days ago).
Posted Apr 29, 2024 7:28 UTC (Mon)
by eduperez (guest, #11232)
[Link]
Posted Apr 24, 2024 16:48 UTC (Wed)
by flussence (guest, #85566)
[Link]
Posted Apr 25, 2024 2:07 UTC (Thu)
by Heretic_Blacksheep (guest, #169992)
[Link] (6 responses)
I realize this isn't a good answer for people that are actively using Github to encourage project communication or cooperation, but for the average person that may only be using it casually, can comments be completely turned off to prevent this kind of thing when you have no wish to engage in this way?
Posted Apr 25, 2024 6:42 UTC (Thu)
by taladar (subscriber, #68407)
[Link] (3 responses)
The problem isn't comments, the problem is file uploads for comments being made accessible outside of the comment context.
Posted Apr 25, 2024 9:02 UTC (Thu)
by Karellen (subscriber, #67644)
[Link] (2 responses)
Posted Apr 25, 2024 9:08 UTC (Thu)
by NAR (subscriber, #1313)
[Link]
Posted Apr 25, 2024 10:00 UTC (Thu)
by sidcha (subscriber, #153938)
[Link]
Posted Apr 25, 2024 12:37 UTC (Thu)
by daroc (editor, #160859)
[Link]
Posted Apr 25, 2024 12:43 UTC (Thu)
by bluss (guest, #47454)
[Link]
Posted Apr 25, 2024 14:02 UTC (Thu)
by ibukanov (subscriber, #3942)
[Link] (3 responses)
Posted Apr 25, 2024 14:45 UTC (Thu)
by flussence (guest, #85566)
[Link] (2 responses)
Posted Apr 25, 2024 16:09 UTC (Thu)
by ibukanov (subscriber, #3942)
[Link]
Posted Apr 25, 2024 16:24 UTC (Thu)
by Heretic_Blacksheep (guest, #169992)
[Link]
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
> https://github[.]com/microsoft/vcpkg/files/14125503/Cheat.Lab.2.7.2.zip
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)