Page Loader
Someone is hacking, deleting GitHub repositories for Bitcoins

Someone is hacking, deleting GitHub repositories for Bitcoins

May 05, 2019
10:49 am

What's the story

Reportedly, GitHub has been hit by hackers who are hijacking private code repositories and deleting them in order to blackmail their owners for ransom. They then ask for Bitcoins with a promise of restoring the deleted data, according to a report in Motherboard. Similar cases have been reported on other Git hosting services, including BitBucket and GitLab. Here are the details.

Attack

Project, codes being replaced with ransom message

Several Git service developers have reported a break-in, where their repository was removed and replaced with a demand for Bitcoins. As part of the attack, the hackers left a note saying all source code and recent commits have been downloaded by them and they would make it public or use it themselves if the owner won't agree to pay $570 in bitcoins.

Attack

Hundreds of developers likely compromised

While a small bunch of developers has reported the attack, the exact number of victims could be much larger. BitBucket, on its part, says some 1,000 developer repositories may have been compromised on the basis of internal and online estimates. Meanwhile, a search for the attackers' address on GitHub revealed as many as 392 ransomed projects, ZDNet reported.

Information

Dozens of developers even reported Bitcoin address abuse

In addition to this, the Bitcoin address shared by the attackers has been reported dozens of times, 27 to be exact, on BitcoinAbuse.com - the tracking malicious activity through Bitcoin addresses. It's also worth noting that the address has only received a single $3 payment.

Attack

However, no word on how they're hijacking these repositories

The attack carried out here is different from a typical ransomware attack, where hackers lock-in your PC and demand money. Here, they removed the data from an online platform in what can be described as a well-coordinated attack. There is no word on how they are doing it but some compromised developers have admitted to using weak passwords.

Quote

GitLab's director of security Kathy Wang says they extracted passwords

"We have strong evidence that the compromised accounts have account passwords being stored in plaintext on deployment of a related repository. We strongly encourage the use of password management tools to store passwords in a more secure manner, and enabling two-factor authentication wherever possible."

Workaround

Also, there might be a workaround for you

Now, for some case, security researchers from StackExchange have found that the hackers didn't delete the repository but altered Git commit headers, which means they can be recovered. They have shared the recovery process, but if that doesn't work, we recommend getting in touch with the Git hosting service you are using before jumping to paying the ransom; they will fix it for you.