<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="http://info.threatstop.com/hubfs/github-logo.png" alt="github-logo.png" width="454" height="151"></p> <p>&nbsp;</p> <p>GitHub is a platform used to share any type of code. For this reason, it’s an important part of research and information sharing within the cyber security field. Because it’s a part of this environment, it’s inevitable that malicious actors will try to infect users’ platforms with malware.</p> <!--more--> <p>In the past, there were several publications of malware code later used for active malicious campaigns. For example, Mirai was used for large scale attacks shortly after the code was <a href="https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/">disclosed</a>.</p> <p>In March 2017, <a href="http://researchcenter.paloaltonetworks.com/2017/03/unit42-dimnie-hiding-plain-sight/">Palo Alto Networks</a> published a case revolving around GitHub. Here, GitHub users were targeted by phishing e-mails with job opportunities. Opening the attachment resulted in downloading the <strong>Dimnie</strong> malware.</p> <p><img src="http://info.threatstop.com/hubfs/Dimnie.png" alt="Dimnie.png" width="454" height="97"></p> <p><span>This malware differs by targets, methods and communication to command and control servers.&nbsp;</span>For example, each module is injected into the memory of core Windows processes, causing the analysis to become more complex.</p> <p>Dimnie's connection to the command and control server is over HTTP protocol, but not used in an ordinary way. These connections use a specific feature of the HTTP protocol, Request-URI, to disguise the malicious connection with an inactive, valid service, such as "toolbarqueris.google[.]com".</p> <p>The capabilities of this malware include information disclosure, keylogging, screenshots and smartcard interaction.</p> <p>&nbsp;</p> <p>ThreatSTOP IP Firewall Service and DNS Firewall Service protect against <strong>Dimnie’s</strong> latest campaign when TSCritical targets are enabled.</p></span>