home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 797 of 2,445   
   Mike Powell to All   
   Fake GitHub "securiity al   
   18 Mar 25 09:49:00   
   
   TZUTC: -0500   
   MSGID: 512.consprcy@1:2320/105 2c3ec060   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   These fake GitHub "security alerts" could actually let hackers hijack your   
   account   
      
   Date:   
   Tue, 18 Mar 2025 13:27:00 +0000   
      
   Description:   
   More than 12,000 GitHub users were targeted so far.   
      
   FULL STORY   
      
   Cybercriminals are faking security alerts on GitHub to get unsuspecting users   
   to install malicious applications and lose their work, experts have warned.    
      
   A security researcher alias LC4M discovered the campaign and shared a    
   detailed explanation in a short X thread, noting the attackers created a   
   GitHub account called GitHub Notification, and then opened an issue to a well   
   known security repo stating Security Alert: Unusual Access Attempt.    
      
   We have detected a login attempt on your GitHub account that appears to be   
   from a new location or device, the fake alert reads. If you recognize this   
   activity, no further action is required. However, if this was not you, we   
   strongly recommend securing your account immediately.   
      
   OAuth app    
      
   The alert states the login attempt came from Reykjavik, Iceland, and shares   
   links where users can update their password, review and manage active   
   sessions, and even enable two-factor authentication (2FA).    
      
   However, all of the links lead to a GitHub authorization page for an OAuth    
   app called gitsecurityapp. This app requests numerous permissions, including   
   those that grant full access to public and private repositories, the ability   
   to read and write to the user profile, access to GitHub gists, the permission   
   to delete repositories, and more.    
      
   The researcher updated his thread to say that at least 8,000 GitHub   
   repositories were targeted. However, a BleepingComputer report puts the    
   number of targets at 12,000.    
      
   If you were targeted by this campaign, and ended up granting the permissions,   
   you should revoke the access as soon as possible, and after that - rotate    
   your credentials and authentication tokens just to be on the safe side.    
      
   LC4M could not confidently attribute the campaign to any known threat actor,   
   but they do have their suspicions: Smells DPKR? they said, suggesting that   
   this might be the work of North Korean state-sponsored threat actors.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/these-fake-github-security-alerts-could   
   -actually-let-hackers-hijack-your-account   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca