Security Alert: Active Malware Campaign Exploits GitKraken
A widespread malware campaign is actively abusing DLL side-loading techniques through a signed GitKraken ahost.exe binary. Attackers place a malicious libcares-2.dll file in the same directory to hijack the DLL search order and bypass signature verification mechanisms, allowing arbitrary code execution.
The campaign uses invoice and RFQ-themed phishing lures to distribute info-stealing malware and Remote Access Trojans (RATs). This poses a significant risk to developers and enterprises relying on Git-based tools for version control and collaboration.
Web3 developers using GitKraken should exercise caution with suspicious file attachments and verify the integrity of executable files from trusted sources only. Keep your development tools updated and monitor system behavior for unauthorized DLL loading activities.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
10 Likes
Reward
10
5
Repost
Share
Comment
0/400
StableGenius
· 7h ago
dll side-loading through signed binaries? lol this is exactly why i warned everyone about trusting vendor signatures back in '22. predictable stuff tbh
Security Alert: Active Malware Campaign Exploits GitKraken
A widespread malware campaign is actively abusing DLL side-loading techniques through a signed GitKraken ahost.exe binary. Attackers place a malicious libcares-2.dll file in the same directory to hijack the DLL search order and bypass signature verification mechanisms, allowing arbitrary code execution.
The campaign uses invoice and RFQ-themed phishing lures to distribute info-stealing malware and Remote Access Trojans (RATs). This poses a significant risk to developers and enterprises relying on Git-based tools for version control and collaboration.
Web3 developers using GitKraken should exercise caution with suspicious file attachments and verify the integrity of executable files from trusted sources only. Keep your development tools updated and monitor system behavior for unauthorized DLL loading activities.