New Malware Campaign Exploits SourceForge Projects to Steal Crypto & Spy on Users

Image by Rawpixel.com, from Freepik

New Malware Campaign Exploits SourceForge Projects to Steal Crypto & Spy on Users

Reading time: 2 min

A new malware campaign is targeting users through SourceForge, a trusted site known for hosting open-source software projects.

In a rush? Here are the quick facts:

  • Victims download a fake installer containing a hidden cryptocurrency miner and ClipBanker.
  • Malware sends user data to attackers via Telegram API.
  • Attack chain includes VB scripts, PowerShell commands, and AutoIt interpreters.

Researchers from Kaspersky uncovered a scheme where attackers use a fake project to trick people into downloading malicious files disguised as office tools.

The fake project, called “officepackage,” looks harmless on the SourceForge page.  Additionally, it copies its description from a real Microsoft Office add-ons project on GitHub. But the related officepackage.sourceforge.io domain points to a completely different website that lists fake office apps with “Download” buttons.

The researchers explain that the pages are indexed by search engines, so they look legitimate in search results. But instead of useful software, users are led through a confusing maze of download pages that ultimately install malware on their computers.

The downloaded file, named vinstaller.zip, contains hidden tools including a password-protected archive, and a Windows Installer that looks large and legitimate, but is actually stuffed with junk data to fool users. When launched, it runs a script in secret that downloads files from GitHub, extracts malicious components, and starts spying on the device.

One of the hidden scripts sends the victim’s device details to attackers through Telegram. This includes the computer’s IP address, username, antivirus software, and even the CPU name.

The malware does two main things: first, it installs a cryptocurrency miner that quietly uses the computer’s resources to generate digital money for the attackers.

Second, it installs a type of malware called ClipBanker, which waits for users to copy and paste cryptocurrency wallet addresses. When they do, it replaces the wallet address with one owned by the attacker, redirecting funds to them.

The malware uses several methods to stay on the system and automatically restart even after rebooting. It hides in system folders, adds special registry keys, creates fake Windows services, and even hijacks system update tools.

To stay safe, experts strongly advise downloading software only from official sources, as pirated or unofficial downloads always carry a higher risk of infection.

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!

We're thrilled you enjoyed our work!

As a valued reader, would you mind giving us a shoutout on Trustpilot? It's quick and means the world to us. Thank you for being amazing!

Rate us on Trustpilot
0 Voted by 0 users
Title
Comment
Thanks for your feedback
Loader
Please wait 5 minutes before posting another comment.
Comment sent for approval.

Leave a Comment

Loader
Loader Show more...