Clone, Compile, Compromise: Open-Source Malware Trap on GitHub
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
A newly identified threat actor, Water Curse, is exploiting GitHub to deliver weaponized repositories containing multistage malware. The group has been linked to at least 76 GitHub accounts, targeting cybersecurity professionals, game developers, and DevOps teams. Their malware enables data exfiltration, remote access, and long-term persistence on infected systems. The attack begins with trojanized open-source tools, progresses through complex infection chains using obfuscated scripts, and culminates in extensive system reconnaissance and data theft. Water Curse employs anti-debugging techniques, privilege escalation methods, and persistence mechanisms to maintain control over affected systems. The campaign poses a significant supply chain risk, especially to those relying on open-source tooling from GitHub.
OPENCTI LABELS :
open-source,data exfiltration,supply chain,github,persistence,privilege escalation,anti-debugging,backdoor.js.dullrat,multistage malware
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Clone, Compile, Compromise: Open-Source Malware Trap on GitHub