{"id":152082,"date":"2025-02-26T20:00:56","date_gmt":"2025-02-26T18:00:56","guid":{"rendered":"https:\/\/cryptodnes.bg\/en\/?p=152082"},"modified":"2025-02-26T18:22:30","modified_gmt":"2025-02-26T16:22:30","slug":"cybercriminals-exploit-github-to-distribute-crypto-malware","status":"publish","type":"post","link":"https:\/\/cryptodnes.bg\/en\/cybercriminals-exploit-github-to-distribute-crypto-malware\/","title":{"rendered":"Cybercriminals Exploit GitHub to Distribute Crypto Malware"},"content":{"rendered":"

A recent report<\/a> <\/strong>from Kaspersky highlights a rising trend of fake projects that trick unsuspecting developers into downloading malicious software under the guise of legitimate tools.<\/p>\n

These fake repositories, part of a campaign called \u201cGitVenom,\u201d feature software that masquerades as useful programs, such as Bitcoin wallet managers or Instagram automation tools. However, beneath the surface, the software is equipped with hidden threats like remote access trojans (RATs) and clipboard hijackers, which can collect user data and even replace crypto wallet addresses with those controlled by the attackers.<\/p>\n

Kaspersky\u2019s investigation reveals that these hackers have been active for over two years, creating convincing-looking projects with AI-generated documentation and regular \u201cupdates\u201d to maintain the illusion of legitimacy. Despite the appearance of activity, the projects typically do very little, performing only meaningless tasks that disguise their true intentions.<\/p>\n