Malware Problem: Reporting Is Not Enough Anymore #183233
Replies: 3 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
The following repositories are some other examples that have been reported by security researchers and, at the time of writing, are still remain accessible on GitHub: https://github.com/kurdretlikudret-art/arterte Feedback from GitHub on how such cases are reviewed, prioritized, and addressed—particularly when active malware distribution is suspected—would be greatly appreciated, as it would help the security community better align its reporting efforts and expectations. |
Beta Was this translation helpful? Give feedback.
-
|
I also have reported quite a number of repos but obviously they keep popping up faster than GH team can manually delete them. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
GitHub plays a critical role in the global software ecosystem, which also makes it an attractive target for malware abuse. Security researchers continue to observe repositories that are clearly created for malicious distribution and are actively used in real-world attacks.
While GitHub provides reporting mechanisms, response time is crucial. Even brief delays can allow malicious repositories to be leveraged at scale, often benefiting from the platform’s strong reputation and user trust.
Improving prioritization and speed for clear malware cases would significantly reduce risk for users and organizations. Many in the security community are willing to collaborate and share insights to help address this challenge more effectively.
Strengthening defenses against this type of abuse will further reinforce trust in the platform and the broader open-source ecosystem.
Examples include repositories distributing obfuscated loaders, credential stealers, and trojanized “cracked” tools, often hosted under newly created accounts and used directly in phishing or malware delivery campaigns.
Below are simple example that I have observed recently, targeting Turkish users probably:
https://github.com/nuribilgeceylen-eng/babacan
https://github.com/selim1192353/aa
https://github.com/gaqgazec-lgtm/atraa
Beta Was this translation helpful? Give feedback.
All reactions