TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Malicious code added to 35k GitHub repos, leaking user environments

215 pointsby pcmonkalmost 3 years ago

15 comments

oefrhaalmost 3 years ago
What a garbage clickbait thread. From scary words like &quot;attack&quot;, &quot;infected&quot;, etc. you would think projects are compromised. But nothing is compromised. From wayyyyy down in the thread:<p>&gt; The attacker creates FAKE orgs&#x2F;repos and pushes clones of LEGIT projects to github.<p>Yeah, anyone can push anything to their own GitHub accounts&#x2F;orgs, including malware. We know that.<p>Save yourself some time. Flagged.
评论 #32328818 未加载
评论 #32329463 未加载
评论 #32328809 未加载
评论 #32328802 未加载
raggialmost 3 years ago
This code does more than leak environments. The go code pulls down arbitrary text and passes it to sh -c, example: <a href="https:&#x2F;&#x2F;github.com&#x2F;zerops-io&#x2F;zcli&#x2F;commit&#x2F;0396ee57bc0e5e0b12323aac7a240c4563488f9b#diff-c444f711e9191b53952edb65bfd8c644419fc7695c62611dc0fb304b4fb197d6R50" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zerops-io&#x2F;zcli&#x2F;commit&#x2F;0396ee57bc0e5e0b123...</a>
sorulyalmost 3 years ago
note that it&#x27;s 35,613 code results, not 35k repos<p>and 13K of the search results come from this org<p><a href="https:&#x2F;&#x2F;github.com&#x2F;redhat-operator-ecosystem" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;redhat-operator-ecosystem</a>
评论 #32328727 未加载
评论 #32328461 未加载
abctreealmost 3 years ago
This is a consequence of centralization. The canonical project sites and repositories should not be on GitHub.<p>Fanatics who believe otherwise will still clone those projects so that they are on sacred ground, but the practice should be frowned upon and fought against.<p>Another detrimental effect of GitHub is that they have trained users to accept public &quot;forks&quot; (a misnomer) as the usual way to contribute even trivial patches. This lowers the bar for accepting and trusting non-official repositories.<p>GitHub has devalued the brand of large projects and has introduced the age of industrialized software development by creating an addictive environment where software politicians thrive by manipulating their social networks and working on their personal brand.
评论 #32328822 未加载
drekipusalmost 3 years ago
This is that thing where people can put anyone in as the commit author, thus impersonating the original creator right?<p>Seems like the solution is &quot;don&#x27;t just copy random github urls into your code&quot; ?
评论 #32328240 未加载
评论 #32328900 未加载
评论 #32328108 未加载
mcraihaalmost 3 years ago
They have attacks for different programming languages and environments. So not just a single target (e.g. npm) attack.
rollulusalmost 3 years ago
While browsing the nanobox repo linked in the twitter thread I started to get 404s, so it looks like GitHub is on it. Edit: other repos have vanished as well now.
jwilkalmost 3 years ago
&gt; So far found in projects including: crypto, golang, python, js, bash, docker, k8s<p>Huh? What does that mean?
评论 #32328316 未加载
评论 #32328305 未加载
muppetmanalmost 3 years ago
How would code like this make it into so many repos? People accepting pull requests and not properly reviewing them? Or is there something even worse about this attack?
评论 #32328056 未加载
评论 #32328051 未加载
3npalmost 3 years ago
TL;DR: These are forks by unknown people containing malware. I see no indication in the linked thread of even a single successful compromise actually occurring, or malicious code making it into legitimate upstream projects.
评论 #32328443 未加载
dustinmorisalmost 3 years ago
Do we need verified orgs on GitHub now?
thih9almost 3 years ago
&gt; Correction, 35k+ &quot;code hits&quot; on github, not infected repositories.<p>Source: <a href="https:&#x2F;&#x2F;mobile.twitter.com&#x2F;stephenlacy&#x2F;status&#x2F;1554718086657282049" rel="nofollow">https:&#x2F;&#x2F;mobile.twitter.com&#x2F;stephenlacy&#x2F;status&#x2F;15547180866572...</a>
bonzinialmost 3 years ago
Somebody should DDoS ovz1.j19544519.pr46m.vps.myjino.ru... (mostly kidding)
评论 #32328243 未加载
评论 #32328667 未加载
robertwt7almost 3 years ago
how is this affecting people if the clone does not open PRs to the original one?<p>so this will send data to the hacker&#x27;s network if we clone and build the wrong repo right?
rvzalmost 3 years ago
Oh dear. This is a gigantic disaster.<p>If lots of software released today haven&#x27;t been pinning their versions on release (especially Electron apps) or signing their commits if they are open-source, then this is a chaotic supply chain attack waiting to happen and is more worse than I thought.<p>But really it is yet, another reason to avoid GitHub entirely and just self-host using GitLab or Gitea.
评论 #32328508 未加载
评论 #32328173 未加载