Connect with us

Security

Beware: Malicious Code Alerts on GitHub Targeting Developers

Published

on

Fake VS Code Alerts on GitHub Spread Malware to Developers

A large-scale campaign is targeting developers on GitHub with fraudulent Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects. The goal is to deceive users into downloading malicious software.

The deceptive posts are designed to appear as legitimate vulnerability advisories, using titles like “Severe Vulnerability – Immediate Update Required” and fake CVE IDs to create a sense of urgency.

In an attempt to add credibility to the scheme, the threat actor often impersonates actual code maintainers or researchers.

Security experts at Socket, an application security company, have identified this activity as part of a well-coordinated, large-scale operation rather than a random attack.

The fraudulent discussions are automatically generated from newly created or inactive accounts and are distributed across thousands of repositories within a short period. This triggers email notifications to a large number of tagged users and followers.

Fake security alerts in Discussions
Fake security alerts on GitHub Discussions
Source: Socket

According to Socket researchers, there are thousands of nearly identical posts across repositories, indicating a coordinated spam campaign rather than an isolated incident.

As GitHub Discussions trigger email notifications, these deceptive posts are delivered directly to developers’ inboxes.

The fraudulent posts contain links to supposedly updated versions of the affected VS Code extensions, hosted on external platforms like Google Drive.

Example of the fake security alert
Example of the fake security alert
Source: Socket

Although Google Drive is not the official distribution channel for VS Code extensions, it is a trusted service. Users may overlook this red flag in their haste to update.

Clicking the Google Drive link initiates a series of redirects that lead users to drnatashachinn[.]com, where a JavaScript reconnaissance script runs.

See also  INTERPOL's Global Crackdown: Taking Down 45,000 Malicious IPs and 94 Cybercriminals

This script gathers information such as the victim’s timezone, locale, user agent, operating system details, and automation indicators. The collected data is then sent to the command-and-control server via a POST request.

Deobfuscated JS payload
Deobfuscated JS payload
Source: Socket

This process acts as a traffic distribution system, filtering out bots and researchers and delivering the next stage of the attack only to verified victims.

While Socket did not capture the second-stage payload, they noted that the JavaScript script does not directly deliver it or attempt to steal credentials.

This is not the first instance of threat actors exploiting GitHub’s notification systems for distributing phishing and malware.

In a phishing campaign in March 2025, 12,000 GitHub repositories were targeted with fake security alerts to trick developers into authorizing a malicious OAuth app, granting attackers access to their accounts.

In June 2024, threat actors utilized GitHub’s email system to direct targets to phishing pages through spam comments and pull requests on repositories.

When encountering security alerts, users are advised to verify vulnerability identifiers from reputable sources like the National Vulnerability Database (NVD), CISA’s Known Exploited Vulnerabilities catalog, or MITRE’s Common Vulnerabilities and Exposures program.

It is essential for users to assess the legitimacy of such alerts before taking action, looking out for signs of fraud such as external download links, unverified CVEs, and excessive tagging of unrelated users.

Trending