Hiding in GitHub
An AMOS malware campaign has been discovered utilizing GitHub repositories to distribute malicious files. The attackers created a fake Ledger Live app that prompts users to enter their secret phrases, which are then exfiltrated. The malware uses obfuscation techniques, including base64 encoding and custom XOR operations. The campaign targets cryptocurrency users, specifically those using hardware wallets. The malware is distributed through DMG files and ZIP archives, containing both x64 and ARM64 versions of AMOS. The attackers use multiple domains for command and control, and the malware performs checks to detect virtual environments.
AI Analysis
Technical Summary
The "Hiding in GitHub" campaign involves the AMOS malware family leveraging GitHub repositories to distribute malicious payloads targeting macOS users, specifically cryptocurrency holders using hardware wallets. The attackers masquerade as a legitimate Ledger Live application, a popular interface for managing Ledger hardware wallets, to trick victims into entering their secret recovery phrases. These phrases are then exfiltrated to attacker-controlled infrastructure. The malware is distributed primarily via DMG files and ZIP archives containing both x64 and ARM64 binaries, ensuring compatibility with a broad range of macOS devices. To evade detection, the malware employs multiple obfuscation techniques, including base64 encoding and custom XOR operations, complicating static and dynamic analysis. It also performs environment checks to detect virtual machines or sandbox environments, likely to avoid analysis by security researchers. Command and control (C2) communications are conducted over multiple attacker-controlled domains, enhancing resilience and complicating takedown efforts. The campaign uses several MITRE ATT&CK techniques such as credential dumping (T1056.001), masquerading (T1036.005), user execution (T1204.002), hardware wallet tampering (T1553.002), command execution (T1059.002), obfuscated files or information (T1027), and data exfiltration over C2 channels (T1071.001). Although no CVE or known exploits in the wild are reported, the campaign’s sophistication and targeting of high-value cryptocurrency assets make it a significant threat to macOS users involved in crypto asset management.
Potential Impact
European organizations and individuals involved in cryptocurrency trading, asset management, or development of blockchain technologies face substantial risks from this campaign. The theft of secret recovery phrases can lead to irreversible loss of cryptocurrency assets, financial damage, and reputational harm. Organizations supporting cryptocurrency services or hardware wallet distribution may experience indirect impacts through customer trust erosion and potential regulatory scrutiny. The use of GitHub as a distribution vector also raises concerns about supply chain security and the potential for similar tactics to be adopted against other software projects. Given the campaign targets macOS platforms, organizations with macOS endpoints, especially those used by developers or crypto professionals, are at risk. The malware’s evasion techniques and multi-architecture support increase the likelihood of successful infection and persistence. Additionally, the campaign’s use of multiple C2 domains complicates incident response and containment efforts. While the campaign currently targets individual users primarily, the potential for lateral movement or broader organizational compromise exists if infected devices are connected to corporate networks.
Mitigation Recommendations
1. Implement strict verification procedures for downloading cryptocurrency-related applications, especially Ledger Live or similar wallet management software. Users should only download software from official vendor websites or verified app stores rather than third-party repositories like GitHub. 2. Employ endpoint protection solutions capable of detecting obfuscated malware and monitor for suspicious behaviors such as unusual network connections to multiple unknown domains. 3. Enforce application whitelisting on macOS endpoints to prevent execution of unauthorized DMG or ZIP files containing untrusted binaries. 4. Educate users about the risks of entering secret recovery phrases into any application other than the official wallet software and emphasize the irreversibility of cryptocurrency transactions. 5. Monitor network traffic for connections to known malicious C2 domains associated with this campaign and block them at the perimeter. 6. Use threat intelligence feeds to update detection signatures with the provided file hashes and indicators of compromise. 7. Conduct regular audits of GitHub repositories used internally or by partners to detect any unauthorized or malicious uploads. 8. Deploy macOS-specific security tools that can detect virtual environment evasion attempts and anomalous process behaviors. 9. Encourage multi-factor authentication and hardware security modules for organizational cryptocurrency holdings to reduce reliance on secret phrases alone. 10. Maintain incident response plans that include procedures for cryptocurrency theft scenarios and coordinate with law enforcement where appropriate.
Affected Countries
Germany, United Kingdom, France, Netherlands, Switzerland, Sweden
Indicators of Compromise
- hash: 34a192d4efbccede2362bc7bf84d1398
- hash: 2b7e58d66e0d3f55c4a3e0e23ca51b2e13e654874379fb57c63ae6af9167c0b5
- hash: 9f8c5612c6bfe7ab528190294a9d5eca9e7dec3a7131463477ae103aeec5703b
- hash: d46bbb399b19e476cc9c09db4b6a42fe4741439c88bafb8e6d9ed47061f2d315
- hash: 6a403f0aef43253921d6a54c25931df697b09791
- domain: window.location.search
Hiding in GitHub
Description
An AMOS malware campaign has been discovered utilizing GitHub repositories to distribute malicious files. The attackers created a fake Ledger Live app that prompts users to enter their secret phrases, which are then exfiltrated. The malware uses obfuscation techniques, including base64 encoding and custom XOR operations. The campaign targets cryptocurrency users, specifically those using hardware wallets. The malware is distributed through DMG files and ZIP archives, containing both x64 and ARM64 versions of AMOS. The attackers use multiple domains for command and control, and the malware performs checks to detect virtual environments.
AI-Powered Analysis
Technical Analysis
The "Hiding in GitHub" campaign involves the AMOS malware family leveraging GitHub repositories to distribute malicious payloads targeting macOS users, specifically cryptocurrency holders using hardware wallets. The attackers masquerade as a legitimate Ledger Live application, a popular interface for managing Ledger hardware wallets, to trick victims into entering their secret recovery phrases. These phrases are then exfiltrated to attacker-controlled infrastructure. The malware is distributed primarily via DMG files and ZIP archives containing both x64 and ARM64 binaries, ensuring compatibility with a broad range of macOS devices. To evade detection, the malware employs multiple obfuscation techniques, including base64 encoding and custom XOR operations, complicating static and dynamic analysis. It also performs environment checks to detect virtual machines or sandbox environments, likely to avoid analysis by security researchers. Command and control (C2) communications are conducted over multiple attacker-controlled domains, enhancing resilience and complicating takedown efforts. The campaign uses several MITRE ATT&CK techniques such as credential dumping (T1056.001), masquerading (T1036.005), user execution (T1204.002), hardware wallet tampering (T1553.002), command execution (T1059.002), obfuscated files or information (T1027), and data exfiltration over C2 channels (T1071.001). Although no CVE or known exploits in the wild are reported, the campaign’s sophistication and targeting of high-value cryptocurrency assets make it a significant threat to macOS users involved in crypto asset management.
Potential Impact
European organizations and individuals involved in cryptocurrency trading, asset management, or development of blockchain technologies face substantial risks from this campaign. The theft of secret recovery phrases can lead to irreversible loss of cryptocurrency assets, financial damage, and reputational harm. Organizations supporting cryptocurrency services or hardware wallet distribution may experience indirect impacts through customer trust erosion and potential regulatory scrutiny. The use of GitHub as a distribution vector also raises concerns about supply chain security and the potential for similar tactics to be adopted against other software projects. Given the campaign targets macOS platforms, organizations with macOS endpoints, especially those used by developers or crypto professionals, are at risk. The malware’s evasion techniques and multi-architecture support increase the likelihood of successful infection and persistence. Additionally, the campaign’s use of multiple C2 domains complicates incident response and containment efforts. While the campaign currently targets individual users primarily, the potential for lateral movement or broader organizational compromise exists if infected devices are connected to corporate networks.
Mitigation Recommendations
1. Implement strict verification procedures for downloading cryptocurrency-related applications, especially Ledger Live or similar wallet management software. Users should only download software from official vendor websites or verified app stores rather than third-party repositories like GitHub. 2. Employ endpoint protection solutions capable of detecting obfuscated malware and monitor for suspicious behaviors such as unusual network connections to multiple unknown domains. 3. Enforce application whitelisting on macOS endpoints to prevent execution of unauthorized DMG or ZIP files containing untrusted binaries. 4. Educate users about the risks of entering secret recovery phrases into any application other than the official wallet software and emphasize the irreversibility of cryptocurrency transactions. 5. Monitor network traffic for connections to known malicious C2 domains associated with this campaign and block them at the perimeter. 6. Use threat intelligence feeds to update detection signatures with the provided file hashes and indicators of compromise. 7. Conduct regular audits of GitHub repositories used internally or by partners to detect any unauthorized or malicious uploads. 8. Deploy macOS-specific security tools that can detect virtual environment evasion attempts and anomalous process behaviors. 9. Encourage multi-factor authentication and hardware security modules for organizational cryptocurrency holdings to reduce reliance on secret phrases alone. 10. Maintain incident response plans that include procedures for cryptocurrency theft scenarios and coordinate with law enforcement where appropriate.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://medium.com/walmartglobaltech/amos-hiding-in-github-199eabea6605"]
- Adversary
- AMOS
- Pulse Id
- 6855b5c3b1b7afa76a4cd25d
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash34a192d4efbccede2362bc7bf84d1398 | — | |
hash2b7e58d66e0d3f55c4a3e0e23ca51b2e13e654874379fb57c63ae6af9167c0b5 | — | |
hash9f8c5612c6bfe7ab528190294a9d5eca9e7dec3a7131463477ae103aeec5703b | — | |
hashd46bbb399b19e476cc9c09db4b6a42fe4741439c88bafb8e6d9ed47061f2d315 | — | |
hash6a403f0aef43253921d6a54c25931df697b09791 | — |
Domain
Value | Description | Copy |
---|---|---|
domainwindow.location.search | — |
Threat ID: 68568e6baded773421b59ad8
Added to database: 6/21/2025, 10:50:19 AM
Last enriched: 6/21/2025, 1:07:21 PM
Last updated: 8/14/2025, 4:00:08 PM
Views: 24
Related Threats
A Mega Malware Analysis Tutorial Featuring Donut-Generated Shellcode
MediumMalicious JavaScript Injects Fullscreen Iframe On a WordPress Website
MediumCoordinated Brute Force Campaign Targets Fortinet SSL VPN
MediumSilent Watcher: Dissecting Cmimai Stealer's VBS Payload
MediumCastleLoader Analysis
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.