Clone, Compile, Compromise: OpenSource Malware Trap on GitHub

A newly identified threat actor, Water Curse, is exploiting GitHub to deliver weaponized repositories containing multistage malware. The group has been linked to at least 76 GitHub accounts, targeting cybersecurity professionals, game developers, and DevOps teams. Their malware enables data exfiltration, remote access, and long-term persistence on infected systems. The attack begins with trojanized open-source tools, progresses through complex infection chains using obfuscated scripts, and culminates in extensive system reconnaissance and data theft. Water Curse employs anti-debugging techniques, privilege escalation methods, and persistence mechanisms to maintain control over affected systems. The campaign poses a significant supply chain risk, especially to those relying on open-source tooling from GitHub. Author: AlienVault

Related Tags:
anti-debugging

Backdoor.JS.DULLRAT

privilege escalation

T1089

T1102.002

T1213.002

T1497.001

T1562.004

T1548.002

Associated Indicators:
6B78948F441EEE53F21791D4DD88DD4FDCD5F7E3

27C4161777BA005166156DE311BA58DE49EAC874

4C189405D684EB8E70B1848B356967E783B9C543

AD25EE224973140D41C6ECF1C1500D4EFEB0B324

2FC0686693AFD37778CBA68702986065E995F765

FDB9FC2DE72BE71084CC60508D00BEDBF9337172

E1A02B787597A844B82A73C2488000088D0533B4

60BDF425BD22C34BAD7D5663DB31D2107153F729

6894AA7C5BB643B8C32C10F6C409BBAAE250EA85