News

Attacker hacked other users’ Git-repositories and requires money for data recovery

ZDNet journalists pointed attention on unusual problem of Git-repositories, including GitHub, Bitbucket and GitLab users.

Last week unknown attacker or a group of attackers started hacking other people’s repository, delete all initial codes and comments, and later require buyout for data recovery.

Message with buyout request that is presented above, also says that prior to deleting information attacker thoughtfully saved it on his server, and victim has 10 days on payment transition. Otherwise attacker threatens to delete data forever.

To recover your lost code and avoid leaking it: Send us 0.1 Bitcoin (BTC) to our Bitcoin address ES14c7qLb5CYhLMUekctxLgc1FV2Ti9DA and contact us by Email at admin@gitsbackup.com with your Git login and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your code is downloaded and backed up on our servers. If we don’t receive your payment in the next 10 Days, we will make your code public or use them otherwise, , — says blackmailer’s message.

Currently on Bitcoin-wallet that is mentioned in the message was not received any transactions, though journalists inform about 392 victims of the blackmail campaign on GitHub only while Atlassian company experts say about at least 1000 involved users.

According to Bad Packets company specialists, the most likeable is that this attack was planned, and hackers scanned network, searching for /.git/config and files with Git configuration, and later used found accounts for penetration repositories. In the interview to ZDNet, GitLab specialists confirmed that this expert’s theory is trustworth, and in the case that investigated GitLlab, issue was hidden in compromised accounts that were stored in the open search.

It is worth noting that StackExchanges users consider that attackers does not delete information from their repositories, but just changes Git commits headlines. If this is true, data can be restored without buyout payments. On StackExchange have already prepared instruction for this case.

In addition, security specialists actively call victims not to pay to the blackmailer and instead to turn in GitHub, GitLab and Bitbucket support that can allegedly help them.

Security specialists actively call victims not to pay to the blackmailer

Source: https://www.zdnet.com

Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Recent Posts

Remove Himalayaview.top Pop-up Ads

About Himalayaview.top Himalayaview.top pop-ups can not launch out of the blue. If you have actually…

9 hours ago

Remove Youdilgad.top Pop-up Ads

About Youdilgad.top Youdilgad.top pop-ups can not expose out of the blue. If you have clicked…

9 hours ago

Remove Alkads.com Pop-up Ads

About Alkads.com Alkads.com pop-ups can not launch out of the blue. If you have clicked…

9 hours ago

Remove Bigamirt.xyz Pop-up Ads

About Bigamirt.xyz Bigamirt.xyz pop-ups can not launch out of nowhere. If you have clicked some…

9 hours ago

Remove Micorban.xyz Pop-up Ads

About Micorban.xyz Micorban.xyz pop-ups can not open out of the blue. If you have actually…

9 hours ago

Remove Msdefender.co.in Pop-up Ads

About Msdefender.co.in Msdefender.co.in pop-ups can not expose out of the blue. If you have actually…

2 days ago