Fake LDAPNightmware exploit on GitHub spreads infostealer malware

Captain Awesome

Level 27
Thread author
Verified
Top Poster
Well-known
Forum Veteran
May 7, 2016
1,647
11,324
2,569
India
A deceptive proof-of-concept (PoC) exploit for CVE-2024-49113 (aka "LDAPNightmare") on GitHub infects users with infostealer malware that exfiltrates sensitive data to an external FTP server.

The tactic isn't novel, as there have been multiple documented cases of malicious tools disguised as PoC exploits on GitHub.
 
New words and phrases:
  • Repo Stars (equivalent to Likes)
  • Growth Hacking (pumping up the Repo stars to attract funding and people to the Repo)
  • Fake Star Attacks (non-legitimate methods used to increase the Repo star count)
In short, it is the age-old proven method of social engineering people with Stars/Likes because people are users that want to use stuff. Predictable.

Why do the threat actors target GitHub and GitLab? Because they are the most popular and visited. Predictable.
 
  • Like
Reactions: Jack