Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Over 390,000 WordPress Credentials Stolen Using GitHub Repository Hosting PoC Malicious Exploits
Global Security

Over 390,000 WordPress Credentials Stolen Using GitHub Repository Hosting PoC Malicious Exploits

AdminBy AdminDecember 13, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 13, 2024Ravi LakshmananCyber ​​attack / malware

It is estimated that a remote GitHub repository that advertised WordPress’ online content management system (CMS) tool allowed more than 390,000 credentials to be stolen.

The malicious activity is part of a larger attack campaign launched by a threat actor dubbed MUT-1244 (where MUT refers to “Mysterious Unattributed Threat”) by Datadog Security Labs, which includes phishing and several trojanized GitHub repositories that post proof of concept. (PoC) code to exploit known security flaws.

“Victims are believed to be attackers, including pentesters and security researchers, as well as malicious threat actors, and had their sensitive data stolen, such as private SSH keys and AWS access keys,” researcher Christophe Taffani -Dariper, Matt Muir and Adrian Korn said in an analysis shared with The Hacker News.

Not surprisingly, security researchers have been an attractive target, including for threat actors nation-state groups from North Koreaas compromising their systems can provide information about possible exploits related to undisclosed security flaws that they can work on, which can then be used to launch further attacks.

Cyber ​​security

In recent years there is arose trend where attackers to try write with a capital letter about exposing vulnerabilities to create GitHub repositories using fake profiles that claim to post PoCs for the flaws, but are actually created to steal data and even demand payment in exchange for the exploit.

Campaigns conducted by MUT-1244 include not only the use of trojanized GitHub repositories, but also phishing emails that act as a conduit to deliver a second-stage payload capable of dumping a cryptocurrency miner, as well as stealing system information, private SSH keys, environment variables and content associated with specific folders (such as ~/.aws) in File.io.

One such repository was “github(.)com/hpc20235/yawpp” claiming to be “Another WordPress Poster”. Before GitHub was removed, it contained two scripts, one for validating WordPress credentials and one for creating posts using XML-RPC API.

But the tool also contained malicious code in the form of a fake npm dependency, a package called @0xengine/xmlrpc who deployed the same malware. It was originally published on npm in October 2023 as a JavaScript-based XML-RPC server and client for Node.js. The library is no longer available for download.

Notably, cybersecurity company Checkmarx revealed last month that the npm package had remained active for more than a year, attracting around 1,790 downloads.

The yawpp GitHub project is said to have allowed over 390,000 credentials, likely for WordPress accounts, to be stolen into an attacker-controlled Dropbox account by compromising unrelated threat actors who had access to those credentials from using illegal means.

Another method used to deliver the payload involves sending phishing emails to researchers, tricking them into clicking on links that tell them to launch a terminal and copy and paste a shell command to perform the supposed kernel update. Discovery means the first time a Click Fix-style an attack has been documented against Linux systems.

“The second initial access vector that MUT-1244 uses is a set of malicious GitHub users who publish fake proofs of concepts for CVEs,” the researchers explained. “Most of them were created in October or November (2024), have no legitimate business and have an AI-generated profile picture.”

Cyber ​​security

Some of these fake PoC repositories were highlighted earlier Alex Kaganovich, Global Head of Offensive Security at Colgate-Palmolive, in mid-October 2024. But the interesting twist is that the second-stage malware spreads in four different ways –

  • Backdoored configuration file compilation
  • A malicious payload embedded in a PDF file
  • Using the Python dropper
  • Enabling the malicious npm package “0xengine/meow”

“MUT-1244 was able to compromise the system of dozens of victims, mostly Red Commanders, security researchers, and anyone interested in downloading the PoC exploit code,” the researchers said. “This allowed MUT-1244 to access sensitive information, including private SSH keys, AWS credentials, and command history.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.