Hackers Target Open Source Developers via Slack Impersonation

Significant risk — action recommended within 24-48 hours
Basically, hackers pretended to be a trusted leader to trick developers into downloading harmful software.
Hackers are impersonating a Linux Foundation leader on Slack to target open source developers. This social engineering attack exploits trust, tricking victims into downloading malware. Developers are urged to verify identities and enable multi-factor authentication.
What Happened
A sophisticated social engineering campaign is targeting open source developers through Slack. Hackers impersonate a respected leader from the Linux Foundation to lure victims into downloading malware. This attack was highlighted in an advisory from Christopher “CRob” Robinson, CTO at the Open Source Security Foundation (OpenSSF).
How the Attack Works
The attackers created a fake identity of a Linux Foundation leader and sent direct messages to developers in the TODO Group's Slack workspace. They included a phishing link hosted on Google Sites, making it appear legitimate. This method exploits the inherent trust within open source communities.
The Phishing Scheme
The attacker claimed to offer an exclusive AI tool that analyzes open source project dynamics. The message emphasized that only a select few were being invited to access this tool. Along with the phishing link, they provided a fake email address and an access key to add credibility.
Once victims clicked the link, they were directed to a fraudulent authentication page that collected their email and verification code. This was followed by a prompt to install a malicious root certificate, allowing the attacker to intercept encrypted web traffic.
Infection Mechanism
The attack's design varied based on the victim's operating system:
- macOS: A script downloaded and executed a malicious binary named
gapi, granting the attacker full control over the device. - Windows: Users were prompted to install the malicious certificate through a browser dialog, enabling the same interception of traffic.
The attack unfolded in four stages: impersonation, phishing, credential harvesting, and malware delivery. Each step was meticulously crafted to deepen the attacker's access.
Recommendations for Developers
OpenSSF advises developers to take precautions:
- Verify identities out of band; don’t trust Slack messages based solely on display names.
- Do not install root certificates from links sent via chat or email.
- Enable multi-factor authentication (MFA) on all accounts to limit damage if credentials are compromised.
Indicators of Compromise (IoCs)
- Phishing URL: https://sites.google.com/view/workspace-business/join
- Fake email address: cra@nmail.biz
- Access key: CDRX-NM71E8T
- Remote C2 IP: 2.26.97.61
- Malicious macOS binary: gapi
This attack serves as a stark reminder of the vulnerabilities associated with trust in digital communications, particularly in close-knit communities like open source development.
🔍 How to Check If You're Affected
- 1.Check for unusual direct messages from known contacts.
- 2.Verify any requests for sensitive information through another communication channel.
- 3.Monitor for unauthorized installations of certificates on devices.
🗺️ MITRE ATT&CK Techniques
🔒 Pro insight: This attack exemplifies the growing sophistication of social engineering tactics, emphasizing the need for vigilance in trusted communities.