GitHub besieged by millions of malicious repositories in ongoing attack - eviltoast
  • driving_crooner@lemmy.eco.br
    link
    fedilink
    English
    arrow-up
    64
    ·
    8 months ago

    Imagine if AI starts to pick up those malicious code as valid, and when you ask it to help you set up a server or something it gives you the malicious code.

    • TimeSquirrel@kbin.social
      link
      fedilink
      arrow-up
      24
      ·
      edit-2
      8 months ago

      Which is why people still need to learn to code. We are gonna find out real quick who the copypaster fakes are.

    • pdxfed@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      8 months ago

      There was an article a week ago about how hundreds of compromised know exploits were found in GitHub.

      Keep grinding your ITs hours down and outsource and contract and eventually you have 21 year olds responsible for global security with no time or resources and then hey, you’re Boeing!

  • Jeena@jemmy.jeena.net
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    8 months ago

    I planned to selfhost my own code repos forever, this gives me one more little push, but let’s see if I move it to my server.

    • surewhynotlem@lemmy.world
      link
      fedilink
      English
      arrow-up
      32
      ·
      8 months ago

      To try and take over other people’s ci/cd pipelines and inject malware into otherwise legitimate application binaries.

    • phillaholic@lemm.ee
      link
      fedilink
      English
      arrow-up
      10
      ·
      8 months ago

      LastPass hack happened due to a developer logging I. On their home PV which had an outdated and vulnerable version of Plex installed. Swap outdated for “maliciously forked” and now attackers have legit code that can run for months before they use what they’ve injected to take over.

  • jwt@programming.dev
    link
    fedilink
    English
    arrow-up
    4
    ·
    8 months ago

    I wonder how that seven layer obfuscation works in practice. the gif in the article shows an encrypted string being decrypted (with the decryption key right there in plain sight?) and executed, and I get they try to hide it by right aligning it with ~1000 spaces, but wouldn’t that still be super obvious in a git commit diff?

  • Hal-5700X@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    31
    ·
    8 months ago

    Don’t use forks of repositories. Why don’t GitHub restrict forking. What will solve the problem.