Fake VS Code alerts on GitHub spread malware to developers
Recorded: March 27, 2026, 5 p.m.
| Original | Summarized |
Fake VS Code alerts on GitHub spread malware to developers News Featured Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens HackerOne discloses employee data breach after Navia hack Firefox now has a free built-in VPN with 50GB monthly data limit Infinite Campus warns of breach after ShinyHunters claims data theft Fake VS Code alerts on GitHub spread malware to developers Agentic GRC: Teams Get the Tech. The Mindset Shift Is What's Missing. European Commission investigating breach after Amazon cloud account hack This lifetime $160 1TB Koofr cloud storage deal ends in days Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityFake VS Code alerts on GitHub spread malware to developers Fake VS Code alerts on GitHub spread malware to developers By Bill Toulas March 27, 2026 A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading malware. Fake security alerts on GitHub DiscussionsSource: Socket Example of the fake security alertSource: Socket Deobfuscated JS payloadSource: Socket Automated Pentesting Covers Only 1 of 6 Surfaces. Related Articles: Alert Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens Kali Linux 2026.1 released with 8 new tools, new BackTrack mode Firefox now has a free built-in VPN with 50GB monthly data limit Sponsor Posts Synthetic Identities, Proxies & Real Identities for Sale, is yours next? Overdue a password health-check? Audit your Active Directory for free AI is a data-breach time bomb: Read the new report Are your AI accounts being sold on the dark web? Check for free. Is your program ready for agentic GRC? See what shift enterprise teams need to make. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Fake Visual Studio Code (VS Code) alerts were being disseminated across GitHub repositories via automated posts, representing a sophisticated malware campaign targeting developers. Socket, an application security company, identified this operation as a coordinated effort, distributing deceptive security advisories resembling genuine vulnerability reports. These alerts, often incorporating fabricated CVE IDs, were posted to Discussions sections of thousands of repositories, triggering email notifications to a large number of users and followers. The goal was to trick developers into downloading malware from external services like Google Drive. Clicking these links initiated a cookie-driven redirection process, leading victims to a domain (drnatashachinn[.]com) that executed a JavaScript reconnaissance script. This script collected data including the victim’s timezone, locale, user agent, operating system details, and indicators for automation, ultimately sending this information to a command-and-control server. This tactic echoes previous attacks exploiting GitHub’s notification system, including a 2025 campaign targeting 12,000 repositories and a 2024 incident involving spam comments and pull requests to trigger phishing pages. The success of these campaigns highlights a vulnerability within GitHub’s Discussion system, specifically its reliance on email notifications to alert users to activity. Socket researchers note that the current operation doesn't directly deliver a second-stage payload nor attempts to steal credentials. The technique leverages a Traffic Distribution System (TDS) filtering layer, which profiles targets and delivers the secondary stage only to validated victims. The incident underscores the importance of critical thinking and diligent verification when encountering security alerts, particularly those arriving via unsolicited channels. Users are advised to confirm vulnerability identifiers through authoritative sources, such as the National Vulnerability Database (NVD), CISA’s Known Exploited Vulnerabilities catalog, and MITRE’s Common Vulnerabilities and Exposures (CVE) program. Red flags include external download links, unverifiable CVEs, and mass tagging of unrelated users, suggesting a lack of legitimate engagement. This incident serves as a valuable reminder of the continuous threat landscape faced by developers and the need for heightened vigilance against phishing and malware distribution tactics. The scale and sophistication of this operation, combined with prior successful attacks leveraging similar mechanisms, emphasizes the vulnerability of GitHub’s Discussions and underlines the importance of robust security measures and user education within the developer community. |