AI-assisted campaign floods GitHub with over 300 malicious repositories

April 13, 20262 min read1 sources
Share:
AI-assisted campaign floods GitHub with over 300 malicious repositories

Cybersecurity firm Checkmarx has uncovered a large-scale software supply chain attack on GitHub, dubbed "RepoStorm." The campaign, active since at least mid-May 2024, has leveraged artificial intelligence to create and promote over 300 malicious repositories designed to trick users into downloading information-stealing malware.

The threat actors created fake repositories that impersonated a wide range of assets, from developer tools and cracked software to cheats for popular games like Roblox, Fortnite, and Grand Theft Auto V. According to the Checkmarx report, AI was likely used to generate convincing repository names, detailed README files, and persuasive descriptions, allowing the campaign to operate at a significant scale. Users searching for these tools were lured into downloading ZIP archives that appeared legitimate.

These archives did not contain the promised software. Instead, they delivered well-known malware payloads, primarily information stealers such as Lumma, Vidar, and RedLine Stealer. Once executed, this malware is designed to harvest sensitive data from a victim's machine, including browser history, saved credentials, cookies, and cryptocurrency wallet information. In some instances, the repositories were also found to distribute Remote Access Trojans (RATs).

The campaign targets a broad audience, from individual developers and gamers to employees who might download these tools on corporate devices, creating a risk of business network compromise. The use of AI to generate plausible content makes it more difficult for users to distinguish malicious repositories from legitimate ones. Following the disclosure from Checkmarx, GitHub has reportedly removed most of the identified malicious repositories. Security professionals advise users to only download software from official, verified sources and to be highly skeptical of repositories offering cheats or pirated applications.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17