Hackers were found using SEO techniques on the Github page, tricking the victim.
A hacker was found using the SEO technique on the Github page to trick a searching victim into loading a malware fake.
When it comes to the famous and highly reliable Repo or Repository service, it can't escape GitHub, which is a popular source for software developers to find tools or projects, but this reliability has become a vulnerability for hackers to deceive to spread malware at various times, and this is the same time.
According to a report by the website Digwatch, a new malware distribution campaign has been detected by a research team from Trend Micro, a company that develops famous cybersecurity solutions. In this campaign, the research team found that hackers have created more than 100 Repo on GitHub services, impersonating a deposit of famous software for free, including cracked video games and game cheats. But the inside is malware theft and advertising with SEO methods to push fake Repo pages into the top search order, luring them to the bait. Stick to downloading fake software from Repo instead of genuine, which if installed, will lead to installing malware immediately.
The malware is called BoryptGrab, a malware type that steals data from the victim's machine or Infostealer that focuses on attacking the Windows operating system. The data that this malware aims to steal is Sensitive Information, covering a range of passwords, Cookies files, and Cryptkerrency wallet data, as well as stealing data from popular web browsers such as Chrome, Edge, Firefox, Opera, Brave, and Vivaldi. It can also break through many anti-malware tools.
Not only that, the malware can embed remote control tools so that the hackers behind this malware can log in remotely. This is a guarantee that the malware and hackers will remain on the system. This is very dangerous because hackers can hide inside the system and smuggle data without anyone knowing or catching it.
# hacking # Trending # Lemon 8 Howtoo # lemon 8 diary # freedomhack
