Hello recently I've talked with someone who told me there is a way to hack web-application tokens through GitHub code execution. Past few days I was trying to research on this topic since the guy who told me this didn't go in any details. He just said it is a GitHub logger. This kind of thing is being used in phishing attacks to obtain web-application tokens. It all starts with social engineering, then luring the victim to GitHub where he is social engineered to execute a code which is malicious and captures his tokens/passwords. By doing a research I found a very interesting article which describes similar type of attacks from widely known Lazarus.
www.bitdefender.com
I would like to know more on this topic, if you find this interesting let me know since there is a way to monetize this heavily.
Some questions I have on this topic:
1. Where they obtain aged GitHub accounts with badges and previous repos.
2. What is the tactic to make the victim execute the code(by impersonating a recruiter or fellow dev)
3. Any real-time GitHub repo examples of this
4. How much would it cost to setup a campaign like this ( including buying the GitHub account, setting up social media, buying up the malicious code and etc.)
GitHub Warns of Lazarus Group's Social Engineering Campaign Targeting Developers
GitHub recently issued a security alert warning of a social engineering campaign targeting developer accounts in the cryptocurrency, blockchain, cybersecurity, and online gambling domains.
I would like to know more on this topic, if you find this interesting let me know since there is a way to monetize this heavily.
Some questions I have on this topic:
1. Where they obtain aged GitHub accounts with badges and previous repos.
2. What is the tactic to make the victim execute the code(by impersonating a recruiter or fellow dev)
3. Any real-time GitHub repo examples of this
4. How much would it cost to setup a campaign like this ( including buying the GitHub account, setting up social media, buying up the malicious code and etc.)