Cyber News Watch
  • News
  • Learning Cybersecurity
Categories
Cyber News Watch
  • News
  • Learning Cybersecurity
  • Mobile Application Security

Alarming Scheme: Attackers Target 12,000 GitHub Accounts Using Deceptive Click-Fix Alerts

  • 2 minute read
Total
0
Shares
Share 0
Tweet 0
Pin it 0
github account phishing attack
Up next
content not provided
ARTICLE TITLE
Published on March 17, 2025
Author
CyberNewsWatch Team
Tags
  • account hijacking,
  • GitHub security,
  • phishing alerts
Share article
The post has been shared by 0 people.
Facebook 0
Twitter 0
Pinterest 0
Mail 0

Thousands of GitHub developers are under siege in a new phishing assault. The attack, which began March 16, 2025, has already targeted nearly 12,000 repositories with fake security alerts. It’s a clever scheme, really. Hackers create bogus “Security Alert” issues warning users about suspicious login attempts supposedly from Iceland. Classic fear tactics.

These phony alerts pressure developers to “update passwords” or “enable 2FA” through provided links. Click one, and you’re redirected to what looks like a legitimate GitHub authorization page. But surprise! It’s actually asking you to grant permissions to a malicious OAuth app deceptively named “gitsecurityapp.” Because nothing says trustworthy like adding the word “security” to your malware.

The permissions requested are downright terrifying. Full access to private repositories, ability to delete repos, control over GitHub Actions workflows, and access to personal profile data. Hand over those keys, and attackers fundamentally become you on GitHub. They can read your code, steal your secrets, and wreak havoc on your digital life.

The attack infrastructure isn’t amateur hour, either. The operation uses onrender.com hosting with seven layers of obfuscation in its payload. Once authorized, the malware steals browser passwords, cookies, and other confidential data before sending everything back to command servers. Implementing a CTEM approach could significantly reduce vulnerability to such sophisticated phishing campaigns. Similar attacks have previously used fraudulent career offers with unusually high salaries to lure unsuspecting developers. Experts recommend implementing two-factor authentication (2FA) as a critical defense against such sophisticated phishing attempts.

Victims are often unaware they’ve been compromised until strange things start happening. Unexpected GitHub Actions running? Private gists appearing out of nowhere? That’s your sign. By then, it’s already too late.

The campaign is ongoing, with the number of targeted repositories fluctuating as GitHub works to contain the damage. Meanwhile, attackers continue gathering credentials and sensitive information from unsuspecting developers.

Software developers should be vigilant. Those OAuth permission screens aren’t just annoying pop-ups – they’re literal access requests to your digital kingdom. And in this case, saying “yes” means handing over the keys to people who definitely don’t have your best interests at heart.

Recent Posts

  • Infostealer Malware’s Evolving Threat: Takedowns Fail to Halt Cybercrime Surge
  • Apple’s Alarming Revelation: Three Active 0-Day Vulnerabilities Under Attack
  • Check Point’s Bold Rebuttal to Hacking Claims: Is the Threat Real?
  • Disturbing Flaws Discovered in Canon Printer Drivers Endangering Your Security
  • Unclaimed Mystique: Cyberattack on National Presto Industries Highlights Ransomware Fears

Latest CVEs

  • Apple’s Alarming Revelation: Three Active 0-Day Vulnerabilities Under Attack
cybercrime continues to escalate
  • Malware

Infostealer Malware’s Evolving Threat: Takedowns Fail to Halt Cybercrime Surge

Despite major takedowns, infostealer malware surges to steal 75% of all credentials…
  • CyberNewsWatch Team
  • April 4, 2025
apple 0 day vulnerabilities exploited
  • CVEs

Apple’s Alarming Revelation: Three Active 0-Day Vulnerabilities Under Attack

Apple quietly admits its "impenetrable" security has fallen to three dangerous zero-day…
  • CyberNewsWatch Team
  • April 4, 2025
check point s hacking response
  • Cybersecurity News

Check Point’s Bold Rebuttal to Hacking Claims: Is the Threat Real?

Cybersecurity giant Check Point faces explosive allegations about a December 2024…
  • CyberNewsWatch Team
  • April 4, 2025
canon printer driver vulnerabilities
  • Mobile Security & Wireless

Disturbing Flaws Discovered in Canon Printer Drivers Endangering Your Security

Canon printer drivers contain life-threatening security flaws that transform your…
  • CyberNewsWatch Team
  • April 4, 2025
Cyber News Watch
  • About Us
  • Contact us
  • Terms of Use
  • Privacy Policy
The information provided on this website is provided for informational purposes only. CyberNewsWatch makes no representations or warranties of any kind, expressed or implied, about the completeness, accuracy, adequacy, legality, usefulness, reliability, suitability, or availability of the information, or about anything else. Any reliance you place on the information is therefore strictly at your own risk. Read more in my terms of use and privacy policy. You can also contact me with questions. Copyright 2025.