GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
Posted Apr 24, 2024 16:26 UTC (Wed) by rrolls (subscriber, #151126)Parent article: GitHub comments used to distribute malware (BleepingComputer)
> The URLs for the malware installers [would appear like, for example:]
> https://github[.]com/microsoft/vcpkg/files/14125503/Cheat.Lab.2.7.2.zip
I think the "right" solution here would be to change `/microsoft/vcpkg/` to `/comments/username_of_comment_author/`, or something like that.
It's `username_of_comment_author` who controls that content, so the URL should make that clear, and not associate it with a well-known entity that isn't responsible for it.
Though, I imagine they'll have a tricky time actually implementing such a change...
Posted Apr 24, 2024 16:31 UTC (Wed)
by josh (subscriber, #17465)
[Link] (1 responses)
This seems like the right answer, yeah.
This rhymes with a previous exploit of this type: if you made a PR against a repository, you could link to files via that repository and your commit hash, and they'd look like they were part of the repository. GitHub's fix was to show a banner saying they weren't part of the repository.
Posted Apr 25, 2024 15:42 UTC (Thu)
by wtarreau (subscriber, #51152)
[Link]
Posted Apr 25, 2024 19:52 UTC (Thu)
by srdjant (guest, #171146)
[Link]
I would say it's probably just a random co-incidence, but I am not surprised that devs and maintainers are now looking carefully at their own, and other important projects for signs of attack (e.g. the ZSH Plugin Manager video from 8 days ago).
Posted Apr 29, 2024 7:28 UTC (Mon)
by eduperez (guest, #11232)
[Link]
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
GitHub comments used to distribute malware (BleepingComputer)
