Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Backdoored Open Source Malware Repositories Target Novice Cybercriminals

A threat actor has been creating backdoored open source malware repositories to target novice cybercriminals and game cheaters.

Cybercriminals too face malware infection when using open source repositories without properly checking them, new research from Sophos shows.

This year alone, dozens of reports have revealed supply chain attacks targeting developers, enterprises, or end users to deploy information stealer malware and backdoors, many through malicious NPM packages.

On Wednesday, however, Sophos shed light on a similar attack, this time targeting game cheaters and inexperienced threat actors, via backdoored GitHub repositories.

The cybersecurity firm’s investigation began with the open source malware project Sakura RAT, which was found injected with code designed to infect people who compiled the RAT with information stealers and other backdoors.

The cybersecurity firm discovered four types of backdoors used in the campaign: a PreBuild backdoor, a Python backdoor, a screensaver backdoor, and JavaScript backdoor.

Going down the rabbit hole, Sophos discovered that the individual who published Sakura RAT’s repository created over a hundred other backdoored projects that claimed to offer malware, attack tools, and gaming cheats.

“The upshot is that a threat actor is creating backdoored repositories at scale, predominantly targeting game cheaters and inexperienced threat actors – and has likely been doing so for some time,” Sophos notes.

A common occurrence in the repositories, the cybersecurity firm notes, was the presence of the ‘ischhfd83’ email address, even on those that did not contain backdoors. Another was the large number of commits the repositories had – an average of 4,446 – despite their short life span.

Advertisement. Scroll to continue reading.

The campaign is likely part of a distribution-as-a-service (DaaS) operation that started years ago, with activity apparently linked to it initially exposed in August 2022, when a threat actor was forking legitimate repositories to inject backdoors en masse.

Since then, over a dozen other reports uncovered malicious packages and repositories distributing various malware families and backdoors, including last year’s research on Stargazer Goblin, a threat actor that used over 3,000 GitHub accounts for malware distribution.

The operations flagged over the years – many relying on repositories related to malware and game cheats – can be tied to one another through overlaps and changes in tactics, as some appear to be variations of the current campaign, Sophos says.

The DaaS service is being advertised by a threat actor on a Russian-language cybercrime forum, but Sophos could not link the threat actor to the fresh backdoor campaign.

“The threat actor behind the backdoor campaign may have simply taken code from other sources (potentially including other threat actors), added a backdoor, and then uploaded the result to a repository they controlled,” the company says.

However, Sophos uncovered aliases such as ‘Unknown’ and ‘Muck’ that could be used by the individual behind the campaign, as well as potential links to the arturshi[.]ru and octofin[.]co domains, a social media influencer, a Pastebin user called ‘Ali888Z’, and a Glitch user called ‘searchBRO @artproductgames’.

“We uncovered a significant amount of backdoored GitHub repositories, containing multiple kinds of backdoors. And the backdoors are not simple; as it turned out, they were only the first step in a long and convoluted infection chain, eventually leading to multiple RATs and infostealers. Ironically, the threat actor seems to predominantly target cheating gamers and inexperienced cybercriminals,” Sophos notes.

Related: Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Related: March Madness Requires Vigilance on Both an Individual and Corporate Level

Related: Beware of DeepSeek Hype: It’s a Breeding Ground for Scammers

Related: Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.