Connect with us

News

Hackers Turn SourceForge into Malware Delivery Vehicle in Cryptocurrency Scheme

Published

on

<p class&equals;"" data-start&equals;"245" data-end&equals;"420">A fake Microsoft Office add-in project posted on SourceForge has been caught installing malware that mines and steals cryptocurrency from unsuspecting users&comma; mostly in Russia&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"422" data-end&equals;"566">The scheme abused SourceForge’s trusted platform to gain visibility and legitimacy&comma; exposing over 4&comma;600 machines to risk before being shut down&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"568" data-end&equals;"617">SourceForge Exploited in Rare Malware Campaign<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"619" data-end&equals;"868">It’s not every day you hear SourceForge mentioned in a cyberattack&period; The platform’s been around for years&comma; loved by open-source communities for its transparency and accessibility&period; But those same features&quest; Yeah&comma; they left the door wide open this time&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"870" data-end&equals;"1143">Kaspersky says it recently flagged a project masquerading as a Microsoft Office add-in tool—called &&num;8220&semi;officepackage&&num;8221&semi;—that tricked users into downloading malware&period; The project got indexed by search engines&comma; so anyone Googling &OpenCurlyDoubleQuote;office add-ins” could stumble right into the trap&period;And that’s exactly what happened&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1180" data-end&equals;"1382">More than 4&comma;600 systems were compromised&period; Most of them were in Russia&comma; but that doesn’t mean it couldn’t have spread further&period; It’s just that the campaign got caught relatively early&comma; before it exploded&period;<&sol;p>&NewLine;<p data-start&equals;"1180" data-end&equals;"1382"><a href&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;04&sol;sourceforge-malware-attack-office-addins&period;jpg"><img class&equals;"aligncenter size-full wp-image-57181" src&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;04&sol;sourceforge-malware-attack-office-addins&period;jpg" alt&equals;"sourceforge malware attack office addins" width&equals;"1196" height&equals;"820" &sol;><&sol;a><&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"1384" data-end&equals;"1428">The Bait&colon; A Familiar-Looking Project Page<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"1430" data-end&equals;"1493">So how did it work&quest; Simple trick&comma; really&period; But deadly effective&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1495" data-end&equals;"1736">The attackers cloned Microsoft’s legitimate GitHub project &OpenCurlyQuote;Office-Addin-Scripts’ and put it on SourceForge under the name &&num;8220&semi;officepackage&period;&&num;8221&semi; They didn’t just copy the files—they lifted the project description&comma; too&period; Basically&comma; it looked legit&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1738" data-end&equals;"2018">Even worse&comma; SourceForge gives every project owner access to a separate hosted webpage under a subdomain&period; The attackers used &OpenCurlyDoubleQuote;officepackage&period;sourceforge&period;io” to build a convincing-looking landing page&period; It even had those familiar &OpenCurlyDoubleQuote;Download” buttons you&&num;8217&semi;d expect from a tool like this&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2020" data-end&equals;"2123">Click one of those&quest; You get a zip file with a password-protected archive&period; Inside that archive&colon; trouble&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"2125" data-end&equals;"2164">Here&&num;8217&semi;s Where Things Go Off the Rails<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"2166" data-end&equals;"2302">The payload&quest; An MSI file ballooned to 700MB&period; That’s not because it needed to be—nope&period; That’s just a sneaky way to dodge antivirus scans&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2304" data-end&equals;"2539">Once installed&comma; this oversized file unpacks and runs a whole script chain that eventually downloads batch files from GitHub&period; Those scripts set up persistence&comma; tweak registry settings&comma; and install several sketchy components&period; Among them&colon;<&sol;p>&NewLine;<ul data-start&equals;"2541" data-end&equals;"2698">&NewLine;<li class&equals;"" data-start&equals;"2541" data-end&equals;"2564">&NewLine;<p class&equals;"" data-start&equals;"2543" data-end&equals;"2564">An AutoIT interpreter<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"2565" data-end&equals;"2623">&NewLine;<p class&equals;"" data-start&equals;"2567" data-end&equals;"2623">A reverse shell tool masquerading as a Windows component<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"2624" data-end&equals;"2698">&NewLine;<p class&equals;"" data-start&equals;"2626" data-end&equals;"2698">Two DLLs&colon; one to mine cryptocurrency&comma; the other to hijack clipboard data<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"2700" data-end&equals;"2740">So yeah&comma; it’s not just a one-trick pony&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"2742" data-end&equals;"2784">Clipper and Crypto Miner&colon; The Nasty Duo<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"2786" data-end&equals;"2837">This is where the payload starts doing real damage&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2839" data-end&equals;"3023">One of the DLL files starts mining crypto—using your computer’s power&comma; for someone else’s wallet&period; You won’t know until your fans start working overtime and your electricity bill jumps&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3025" data-end&equals;"3245">The second payload is sneakier&period; It’s called a &OpenCurlyDoubleQuote;clipper&period;” Basically&comma; it watches your clipboard&period; If you copy a crypto wallet address—say&comma; to send money—it silently swaps it with the attacker’s address before you hit paste&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3247" data-end&equals;"3426">And if that wasn’t enough&quest; The whole setup phones home via Telegram’s API&period; So the attacker gets your system info—and they can send more malicious files whenever they feel like it&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"3428" data-end&equals;"3473">SourceForge Responds&colon; We Shut It Down Fast<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"3475" data-end&equals;"3557">The good news&quest; SourceForge pulled the malicious project once they were made aware&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3559" data-end&equals;"3624">Logan Abbott&comma; SourceForge’s President&comma; told <em data-start&equals;"3603" data-end&equals;"3621">BleepingComputer<&sol;em>&colon;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3627" data-end&equals;"3784">&OpenCurlyDoubleQuote;There were no malicious files hosted on SourceForge&&num;8230&semi; the malicious actor and project in question were removed almost immediately after it was discovered&period;”<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3786" data-end&equals;"4001">He emphasized that all files on the main SourceForge&period;net domain are scanned for malware&period; Still&comma; they’ve tightened things up—project subdomains can no longer link to shady external files or use redirects&period; That’s new&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4003" data-end&equals;"4049">Here’s what was particularly dangerous though&colon;<&sol;p>&NewLine;<div class&equals;"pointer-events-none relative left-&lbrack;50&percnt;&rsqb; flex w-&lbrack;100cqw&rsqb; translate-x-&lbrack;-50&percnt;&rsqb; justify-center &ast;&colon;pointer-events-auto">&NewLine;<div class&equals;"tableContainer horzScrollShadows">&NewLine;<table class&equals;"min-w-full" data-start&equals;"4051" data-end&equals;"4430">&NewLine;<thead data-start&equals;"4051" data-end&equals;"4072">&NewLine;<tr data-start&equals;"4051" data-end&equals;"4072">&NewLine;<th data-start&equals;"4051" data-end&equals;"4061">Element<&sol;th>&NewLine;<th data-start&equals;"4061" data-end&equals;"4072">Details<&sol;th>&NewLine;<&sol;tr>&NewLine;<&sol;thead>&NewLine;<tbody data-start&equals;"4094" data-end&equals;"4430">&NewLine;<tr data-start&equals;"4094" data-end&equals;"4143">&NewLine;<td class&equals;"" data-start&equals;"4094" data-end&equals;"4112">Platform Abused<&sol;td>&NewLine;<td class&equals;"" data-start&equals;"4112" data-end&equals;"4143">SourceForge &lpar;via subdomain&rpar;<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4144" data-end&equals;"4202">&NewLine;<td class&equals;"" data-start&equals;"4144" data-end&equals;"4162">Malware Payload<&sol;td>&NewLine;<td class&equals;"" data-start&equals;"4162" data-end&equals;"4202">Clipper&comma; Crypto Miner&comma; Reverse Shell<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4203" data-end&equals;"4275">&NewLine;<td class&equals;"" data-start&equals;"4203" data-end&equals;"4221">Infection Chain<&sol;td>&NewLine;<td class&equals;"min-w-&lbrack;calc&lpar;var&lpar;--thread-content-max-width&rpar;&sol;3&rpar;&rsqb;" data-start&equals;"4221" data-end&equals;"4275">MSI &srarr; Batch scripts &srarr; Registry edits &srarr; Persistence<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4276" data-end&equals;"4335">&NewLine;<td class&equals;"" data-start&equals;"4276" data-end&equals;"4294">Infection Count<&sol;td>&NewLine;<td class&equals;"" data-start&equals;"4294" data-end&equals;"4335">Over 4&comma;604 systems &lpar;mostly in Russia&rpar;<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4336" data-end&equals;"4364">&NewLine;<td class&equals;"" data-start&equals;"4336" data-end&equals;"4351">Discovery By<&sol;td>&NewLine;<td class&equals;"" data-start&equals;"4351" data-end&equals;"4364">Kaspersky<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4365" data-end&equals;"4430">&NewLine;<td class&equals;"" data-start&equals;"4365" data-end&equals;"4386">SourceForge Status<&sol;td>&NewLine;<td class&equals;"" data-start&equals;"4386" data-end&equals;"4430">Project removed&comma; new safeguards in place<&sol;td>&NewLine;<&sol;tr>&NewLine;<&sol;tbody>&NewLine;<&sol;table>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<h2 class&equals;"" data-start&equals;"4432" data-end&equals;"4476">Why This Scare Matters More Than It Seems<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"4478" data-end&equals;"4616">This attack wasn’t just another phishing email or shady app&period; It used a platform many people trust—and trust is hard to earn&comma; easy to lose&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4618" data-end&equals;"4822">The hackers didn’t break into anything&period; They didn’t exploit some zero-day vulnerability&period; They just… signed up and uploaded malware like they were releasing an open-source tool&period; That’s how low the bar was&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4824" data-end&equals;"4921">And for users&quest; Searching for a harmless Office add-in turned into a full-blown system compromise&period;This is a wake-up call&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"4948" data-end&equals;"4991">What Users Can Actually Do to Stay Safer<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"4993" data-end&equals;"5168">So yeah&comma; it’s easy to wag the finger and say &OpenCurlyDoubleQuote;just be careful online&period;” But let’s be real—this stuff’s getting sneakier&period; Still&comma; there <em data-start&equals;"5126" data-end&equals;"5131">are<&sol;em> a few solid tips that go a long way&colon;<&sol;p>&NewLine;<ul data-start&equals;"5170" data-end&equals;"5535">&NewLine;<li class&equals;"" data-start&equals;"5170" data-end&equals;"5250">&NewLine;<p class&equals;"" data-start&equals;"5172" data-end&equals;"5250">Don’t download software from random project sites&comma; even if they <em data-start&equals;"5236" data-end&equals;"5242">look<&sol;em> legit<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"5251" data-end&equals;"5322">&NewLine;<p class&equals;"" data-start&equals;"5253" data-end&equals;"5322">Prefer official sources—like Microsoft’s GitHub for developer tools<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"5323" data-end&equals;"5383">&NewLine;<p class&equals;"" data-start&equals;"5325" data-end&equals;"5383">Always scan files before opening&comma; even if they’re zipped<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"5384" data-end&equals;"5450">&NewLine;<p class&equals;"" data-start&equals;"5386" data-end&equals;"5450">Keep your antivirus updated&period; It’s boring advice&period; But it helps&period;<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"5451" data-end&equals;"5535">&NewLine;<p class&equals;"" data-start&equals;"5453" data-end&equals;"5535">If a download asks for a password right away… maybe pause and rethink that click<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"5537" data-end&equals;"5703">One more thing&colon; If your machine suddenly starts lagging hard&comma; check Task Manager&period; If something sketchy’s hogging your CPU&quest; Yeah&comma; you might be mining for someone else&period;<&sol;p>&NewLine;

An engineering graduate, Harry turned to writing after a couple of years of experience in core technology field. At The iBulletin, Harry covers latest updates related to trending apps & games on the app store.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING