Menu
Open-source developers targeted in sophisticated malware attack

Open-source developers targeted in sophisticated malware attack

Attackers have targeted developers present on GitHub since January with an information-stealing program called Dimnie

For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware.

The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs.

The emails had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.

According to researchers from Palo Alto Networks, Dimnie has been around since at least 2014, but has flown under the radar until now because it primarily targeted users from Russia.

The malware uses some stealthy techniques to make its malicious traffic blend into normal user activity. It generates requests that appear to be directed to Google-owned domain names, but which in reality are sent to an attacker-controlled IP address.

Dimnie is able to download additional malicious modules that are injected directly into the memory of legitimate Windows processes. These modules leave no traces on disk, which makes their detection and analysis more complicated, the Palo Alto researchers said in a blog post.

There are separate modules for keylogging, screen grabbing, interacting with smartcards attached to the computer and more. There is even a self-destruct module that wipes all files from the system drive in order to destroy traces of the malware's presence.

Data stolen from an infected computer is encrypted and appended to image headers in an attempt to bypass intrusion prevention systems.

Even though Palo Alto Networks did not attribute these attacks to a particular group, the malware bears striking similarities to other recent attacks that are suspected of being state-sponsored: the use of documents with malicious macros, the use of PowerShell, the loading of malicious code directly in memory, the use of stealthy command-and-control channels and data exfiltration techniques, highly targeted phishing campaigns and more.

Developers can be valuable targets for cyberespionage. Their computers often hold proprietary information and access credentials for their employers' networks and systems.

The Yahoo breach that resulted in hackers gaining access to the accounts of 500 million users started with a semi-privileged employee falling for a spear-phishing email.

The Dimnie attack campaign seems to have specifically targeted developers who are present on GitHub, a free source code hosting service. This category also includes developers who work for large companies and who publish personal open source projects in their spare time.

In a response to a report about these emails in January, Gervase Markham, who works as a policy engineer at Mozilla, said that he received several such messages to an email address that he only used on Github. This made him believe that the targeting might have been automated.

With access to source code repositories and distribution servers attackers can inject backdoors into software projects or turn the compiled binaries into Trojan horses. This has happened several times in the past. For example, the macOS version of the Transmission BitTorrent client hosted on the project's official website was found to contain malware on two separate occasions.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Veritas honours top performing trans-Tasman partners

Veritas honours top performing trans-Tasman partners

Veritas honoured its top performing partners across the channel in Australia and New Zealand, recognising innovation and excellence on both sides of the Tasman. Revealed under the Vivid lights in Sydney, Intalock claimed the coveted Partner of the Year 2017 (Pacific) award, with Data#3 acknowledged for 12 months of strong growth across the market. Meanwhile, Datacom took home the New Zealand honours, with Global Storage and Insentra winning service provider and consulting awards respectively. Dicker Data was recognised as the standout distributor of the year, while Hitachi Data Systems claimed the alliance partner award. Photos by Bob Seary.

Veritas honours top performing trans-Tasman partners
Show Comments