I think Microsoft has a general problem with getting rid of unwanted things within their eco-system. I keep complaining that their feedback.azure.com portal is filled with spam/malware comments and links, but even internally their teams can't reach anyone to get it fixed. Example <a href="https://feedback.azure.com/d365community/idea/9d0b22d8-c025-ec11-b6e6-000d3a4f0f1c" rel="nofollow">https://feedback.azure.com/d365community/idea/9d0b22d8-c025-...</a>
These repos post to Discord webhooks to notify of newly compromised systems.<p>I’ve found Discord to be responsive to abuse complaints in the past. If someone wrote a simple script to download these repos and extract the Discord webhook links I bet you could get Discord to shut down their accounts.<p>In my past experience Discord was aggressive about this, going so far as to ban the accounts of people who had participated on those servers with clearly illegal purposes. They’ll come back and make new accounts again, of course, but having them lose all of their connected servers, history, and requiring them to update every single one of their malware drops should slow them down considerably.
I think to an extent Microsoft is the guilty party here. For may cracks Windows Defender will trip saying "Win32/Keygen" even if there's no actual malware <a href="https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:Win32/Keygen" rel="nofollow">https://www.microsoft.com/en-us/wdsi/threats/malware-encyclo...</a><p>This trains people that do a lot of piracy to be used to turning off their antivirus to let something through, which is fine until it's not. It's like drugs, if we know a subset of the population will do them no matter what, we should make it safe for them to the extent we can. False positives, causing people to ignore actual positives, creates a market for these things.
Why should malware repos be deleted?<p>Serious question. The repos aren't themselves doing harm, are valuable for research, and would be distributed some other way if GH removed them. Maybe a banner “be careful! others have reported that this repo may not do what it claims. proceed with caution” would be a more appropriate response?
Fun fact: if you come across one of these discord webhooks you can delete them.<p>Just curl -X DELETE <a href="https://discord.com/api/webhooks/" rel="nofollow">https://discord.com/api/webhooks/</a>[...]
I think the core of problem here is that applications are not isolated on the OS level.<p>If I download and install a mod for minecraft, it should never have access to anything on my computer, except for the minecraft game files itself. If I open a spreadsheet in Excel, the excel process should have access only to that file and it's own config files.<p>Something similar to how android works, were the app has to explicitly ask the user to access their files.
In my opinion, Microsoft’s entire support is at a tragically poor and hopeless level. GitHub is flooded with open issues that remain open for years without any response from Microsoft. The same applies to Azure. The technical support there is also truly terrible, and it’s easy to find horror stories online about people losing access to their accounts and being unable to restore them.
Some time ago i was asked to help installing a mode for Plants vs. Zombies - a PVZ Fusion mode.<p>When searching for it I found multiple, some had download from github repos. None was looking trustworthy enough, so I didnt download any. But I hesitated a little.<p>From how they looked, I think now that was the kind of malware the author describes.
If you've identified GitHub repositories hosting malware, you can report them directly to GitHub via their Abuse Report page, providing links and any relevant details. GitHub typically removes repositories that violate their Acceptable Use Policy, but response times may vary. If the malware is actively being used for harm, you may also consider reporting it to security organizations or CERT teams.
Ooh, these types of malwares are very old.<p>Most fun you can have is to generate real-like looking data (there are tools for that) and mass send them to these discord webhooks.<p>;-)
What's concerning is that this repository appears to be the template that much of this malware was built from: <a href="https://github.com/Jalynn0922/steal-cook">https://github.com/Jalynn0922/steal-cook</a>. This repo mentioned in the article has existed on GitHub for 3 years without being taken down.<p>Also, I am seeing firsthand that AI is not good at detecting this stuff. Claude's main problem in a code review of one of its descendants was the unethical use of an aim-bot.<p>edit: to clarify, my concern is about how this can exist on Github for 3 years. Thank you for compiling this and sharing your review. Great work.
"Or why you should never download game mods"...<p>Like everything else, you shouldn't blindly search on github - or any other download site.<p>Only download from links referred from the official site if there's any, or the game's forum, or any other trustable and human reviewed source.
> Less then 10% of them have open issues with complaints - others look just fine.<p>I don't know why anyone running one of these schemes to distribute malware would even enable the issues tab on github, let alone not delete every issue posted containing keywords like malware, trojan, virus, etc. with a script.<p>Are hidden until approved issues not supported on github? Is this caused by some limitation of creating these repos programmatically?
>Yes, Redox creates and starts sqlite to gather all the data in a good-looking way.<p>Is that saying it creates a sqlite database? I kind of doubt it. I think more likely is it uses sqlite to read from existing sqlite databases that exist on disk, to steal data from them.
I must admit, sometimes reading gists and other repos on fixing hardware issues I think, "am I downloading malware?".<p>Better to have an attitude that Github is malware and a healthy skepticism of any repo?
Just deleting them is not so useful.
It would be better to uncover the people behind them and who use the collected data.<p>Some honeypot scheme or social engeneering against them.<p>Ideas?
The problem is this can be anything, not just mods and cracks. That's why I keep separate laptop for banking. This may not help if hackers take over the router. But still better than nothing.
npm is full of this shit too, eg. <a href="https://www.npmjs.com/package/openssl-node" rel="nofollow">https://www.npmjs.com/package/openssl-node</a> which I reported weeks ago but is still sitting there.
I always thought it was amusing that if you ask about pirating Windows or Office you get a link to GitHub.<p>Microsoft is alright in my book. Let GitHub be free.
We could make an open source database. Then very simple browser extension to place a very prominent warning on any GitHub repo page that happens to be suspected malware.<p>I guess the problem is that only helps those who already know they need to watch out for this sort of thing, not the users most likely to be pwned.
If there is no malware allowed on GitHub, I guess malware researchers have to use somewhere else to host their code. Which would be a preferable outcome, honestly.
This raises a big question: How effective is GitHub’s abuse reporting system against large-scale malware campaigns? If 1,000+ malicious repos can persist for months, does this mean GitHub lacks automated scanning or relies too much on user reports?