Article Details

Scrape Timestamp (UTC): 2024-01-11 15:38:34.643

Source: https://thehackernews.com/2024/01/threat-actors-increasingly-abusing.html

Original Article Text

Click to Toggle View

Threat Actors Increasingly Abusing GitHub for Malicious Purposes. The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors to host and deliver malicious payloads and act as dead drop resolvers, command-and-control, and data exfiltration points. "Using GitHub services for malicious infrastructure allows adversaries to blend in with legitimate network traffic, often bypassing traditional security defenses and making upstream infrastructure tracking and actor attribution more difficult," Recorded Future said in a report shared with The Hacker News. The cybersecurity firm described the approach as "living-off-trusted-sites" (LOTS), a spin on the living-off-the-land (LotL) techniques often adopted by threat actors to conceal rogue activity and fly under the radar. Prominent among the methods by which GitHub is abused relates to payload delivery, with some actors leveraging its features for command-and-control (C2) obfuscation. Last month, ReversingLabs detailed a number of rogue Python packages that relied on a secret gist hosted on GitHub to receive malicious commands on the compromised hosts. While full-fledged C2 implementations in GitHub are uncommon in comparison to other infrastructure schemes, its use by threat actors as a dead drop resolver – wherein the information from an actor-controlled GitHub repository is used to obtain the actual C2 URL – is a lot more prevalent, as evidenced in the case of malware like Drokbk and ShellBox. Also rarely observed is the abuse of GitHub for data exfiltration, which, per Recorded Future, is likely due to file size and storage limitations and concerns around discoverability. Outside of these four main schemes, the platform's offerings are put to use in various other ways in order to meet infrastructure-related purposes. For instance, GitHub Pages have been used as phishing hosts or traffic redirectors, with some campaigns utilizing a GitHub repository as a backup C2 channel. The development speaks to the broader trend of legitimate internet services such as Google Drive, Microsoft OneDrive, Dropbox, Notion, Firebase, Trello, and Discord being exploited by threat actors. This also includes other source code and version control platforms like GitLab, BitBucket, and Codeberg. "There is no universal solution for GitHub abuse detection," the company said. "A mix of detection strategies is needed, influenced by specific environments and factors such as the availability of logs, organizational structure, service usage patterns, and risk tolerance, among others." The Ultimate Enterprise Browser Checklist Download a Concrete and Actionable Checklist for Finding a Browser Security Platform. Master Cloud Security - Get FREE eBook Comprehensive eBook covering cloud security across infrastructure, containers, and runtime environments for security professionals

Daily Brief Summary

MALWARE // Misuse of GitHub by Malicious Actors for Cyber Attacks

GitHub has become a target for threat actors to host and deliver malicious payloads due to its common use in IT environments.

By leveraging GitHub's services, adversaries manage to blend in with legitimate traffic, avoiding detection and complicating attribution efforts.

Recorded Future's report highlights the use of GitHub for payload delivery, command-and-control obfuscation, and dead drop resolvers.

Rare instances have been noted where GitHub is used for full-fledged C2 implementations or data exfiltration, the latter being less common due to practical limitations.

Beyond these uses, GitHub Pages and repositories are also exploited for phishing, traffic redirection, and as backup C2 channels.

The report addresses the broader issue of legitimate services such as Google Drive and Microsoft OneDrive being misused by cybercriminals.

Recorded Future acknowledges the challenge in detecting GitHub abuse and suggests that a blend of strategies tailored to the specifics of an environment is necessary for effective prevention.