Github Escapes from Octopus Malware that Affected its 26 Software Projects
Github, a platform where every malicious software report is equally different in its place, manages to escape from a malware threat. Github, an organization that united the world’s largest community of coders and software developers, revealed that hackers exploited an open-source platform on its website to distribute malware. The hackers used a unique hacking tool that enabled backdoors in each software project, which the hackers used to infiltrate the software systems.
“While we have seen many cases where the software supply chain was compromised by hijacking developer credentials or typosquatting popular package names, a malware that abuses the build process and its resulting artifacts to spread is both interesting and concerning for multiple reasons,” said Github on its security blog.
Fortunately, the hackers attempt to exploit the open-source platform was unsuccessful. Still, if it were, on the contrary, hackers could’ve secured a position in the software, which were to be used later by corporate applications and other websites.
Since recent times, open-source websites have become a primary target for hackers. It is because once the hackers exploit backdoor vulnerabilities on open-source platforms, thousands of apps are exposed to remote code execution. As for Github, the company’s website currently has more than 10 Million users.
In the Github incident, 26 software projects were infected through malicious codes, which is a severe warning for the potential threat of the open-source compromises. The experts have identified the malware as “Octopus Scanner,” which is capable of stealing data by deploying remote access codes.
The malware spread with the help of projects using software called Apache Beans, tells Github.
“On March 9, we received a message from a security researcher informing us about a set of GitHub-hosted repositories that were, presumably unintentionally, actively serving malware. After a deep-dive analysis of the malware itself, we uncovered something that we had not seen before on our platform: malware designed to enumerate and backdoor NetBeans projects, and which uses the build process and its resulting artifacts to spread itself,” says Github on its blog.
These attacks can be highly threatening as the tactics used here gives the hackers access to various systems.