Linux Foundation Leader Impersonated in Slack Phishing Attack

Significant risk — action recommended within 24-48 hours
Basically, an attacker pretended to be a Linux leader on Slack to trick people into giving away their passwords.
A phishing attack has targeted Linux Foundation members via Slack, impersonating a community leader to steal credentials. Users are warned to verify requests and avoid suspicious links.
What Happened
An attacker has been impersonating a leader from the Linux Foundation in a phishing campaign targeting open-source developers on Slack. This was revealed in an advisory by the Open Source Security Foundation (OpenSSF) on April 7, 2026. The attacker contacted members of the Linux Foundation’s ToDoGroup Slack workspace, attempting to steal credentials and deploy malware.
How It Works
The attacker sends messages on Slack, pretending to be a well-known community leader. Victims are lured into clicking a link that leads to a fake Google Workspace authentication page. This page harvests email addresses and verification codes. After this, victims are prompted to install a malicious “Google certificate.” On Windows, this allows the attacker to intercept encrypted traffic. On macOS, it not only intercepts traffic but also downloads and executes a malicious binary named “gapi.” Executing this binary could lead to full system compromise.
Who's Being Targeted
The primary targets of this campaign are members of the Linux Foundation and developers involved in open-source projects. The campaign follows a series of social engineering attacks on high-impact projects, highlighting the vulnerabilities within the open-source community.
Signs of Infection
If you receive unexpected messages on Slack from known contacts, especially those asking you to click links or install software, be cautious. Additionally, if you have installed any certificates from suspicious links or executed unknown binaries, your system may be compromised.
How to Protect Yourself
OpenSSF recommends several protective measures:
- Verify requests through trusted communication channels, not just Slack profiles.
- Be cautious with links, even if they appear legitimate. The URL may redirect to malicious sites.
- Do not install certificates from links or run untrusted software.
- Enable multi-factor authentication (MFA) for your accounts.
- If you suspect you've been targeted, disconnect from your network, remove any recently installed certificates, run security scans, and rotate your credentials.
Conclusion
This phishing campaign serves as a stark reminder of the ongoing risks faced by developers in the open-source community. By staying vigilant and following security best practices, you can help protect yourself and your projects from these types of attacks.
🔍 How to Check If You're Affected
- 1.Check for unexpected messages from known contacts on Slack.
- 2.Look for any recently installed certificates on your device.
- 3.Run security scans to detect malware or unauthorized changes.
- 4.Rotate credentials if you clicked on suspicious links.
🗺️ MITRE ATT&CK Techniques
🔒 Pro insight: The impersonation tactic used here reflects a growing trend in social engineering, particularly within tech communities where trust is paramount.