Crypto Malware Spreads via SourceForge Posing as Cracked Software

Article Highlights
Off On

Malicious actors have taken advantage of SourceForge, a reputable software hosting platform, to propagate cryptocurrency miner and clipper malware, masquerading as cracked versions of popular applications. This deceptive tactic lures users into downloading harmful software under the guise of legitimate programs such as Microsoft Office, exposing them to significant cybersecurity threats.

Malicious Projects Masquerading as Legitimate Software

Kaspersky, a well-regarded cybersecurity firm, recently revealed that hackers are leveraging SourceForge to disseminate malware by creating fraudulent projects that impersonate legitimate software. One glaring example of this is a project titled “officepackage.” This project ostensibly offers various Microsoft Office add-ins, purportedly sourced from a legitimate GitHub repository. It appears authentic both in its description and content, as it mimics genuine details to deceive users. The strategy behind these fake projects is simple yet effective: attackers replicate the appearance of legitimate applications to create a false sense of security. Users believe they are downloading useful add-ins for their Microsoft Office suite, but in reality, they are stepping into a malware trap. The project “officepackage,” for instance, utilizes components and descriptions directly taken from GitHub, enhancing its illusion of legitimacy. This fraudulent setup on SourceForge, including the domain “officepackage.sourceforge[.]io,” lists numerous Microsoft Office applications and download links primarily in the Russian language, appealing specifically to Russian-speaking users.

Deceptive Download Links and Redirects

The deceptive practices by attackers don’t stop at just mimicking legitimate software projects. When users attempt to download applications from projects like “officepackage,” they encounter a website interface designed to appear convincing. Hovering over the download buttons reveals innocuous-looking URLs such as “loading.sourceforge[.]io/download.” This superficial authenticity builds a false sense of trust among users, making them believe the link will direct them to the intended software.

However, clicking the download button reroutes users to an unrelated webpage hosted on “taplink[.]cc.” Here, users face another download button, leading to the download of a 7 MB ZIP archive named “vinstaller.zip.” Upon opening this archive, users find another password-protected ZIP file (“installer.zip”) and a text file containing the necessary password. Within the protected ZIP file lies an MSI installer crafted to deploy malicious components. This installer includes a console archive utility known as “UnRAR.exe,” a RAR archive, and a VB script.

The VB script runs a PowerShell interpreter, which executes a batch file named “confvk” fetched from GitHub. This file harbors the password for the RAR archive and facilitates the execution of more malicious scripts. The batch file initiates two critical PowerShell scripts: one that transmits system metadata through the Telegram API, and another that downloads an additional script to act on the RAR archive contents. This intricate process ultimately leads to the deployment of malware payloads, specifically ClipBanker—a cryptocurrency miner and clipper malware.

Broader Implications and Additional Campaigns

The deployment of cryptocurrency malware via SourceForge is not an isolated incident. Kaspersky’s report highlights broader implications, suggesting that the malware scheme may enable attackers to gain system access, potentially selling it to more dangerous entities. This aspect underscores the significant threat posed to users who download software from unofficial sources.

Further complicating the picture, another campaign involves distributing a malware downloader known as TookPS. This downloader spreads via fraudulent sites imitating legitimate software platforms. For instance, sites like “deepseek-ai-soft[.]com” mimic the DeepSeek AI chatbot and various remote desktop and 3D modeling tools. These fake websites appear authentic and often rank high in sponsored Google search results, ensnaring unsuspecting users. TookPS’s primary function is to download and run PowerShell scripts that allow remote access to infected systems via SSH. The downloader also deploys a modified trojan called TeviRat, which gives attackers unrestrained access to victims’ computers.

Additionally, Kaspersky’s findings indicate the use of DLL sideloading techniques to alter TeamViewer remote access software on infected machines. By placing a malicious library alongside TeamViewer, hackers can modify its behavior stealthily, enabling covert remote access without the user’s awareness.

Evolving Threat Landscape

Malicious actors have exploited SourceForge, a respected software-hosting platform, to spread cryptocurrency miner and clipper malware. They disguise these harmful programs as cracked versions of popular applications, deceiving users into downloading what they think are legitimate software packages such as Microsoft Office. This treacherous tactic not only undermines the trust in well-known applications but also puts users at serious risk of cybersecurity threats. Instead of getting the desired software, users end up with malware that can drain their computer’s resources by mining cryptocurrencies or intercept and alter clipboard contents to steal sensitive information, such as cryptocurrency wallet addresses or other personal data. This kind of malicious attack highlights the importance of downloading software only from trusted sources and being wary of cracked versions, which often come with hidden dangers. SourceForge’s reputation as a reliable platform is being manipulated by these bad actors, stressing a need for greater vigilance and stronger security measures to protect users from such deceptive practices.

Explore more

Strategies to Strengthen Engagement in Distributed Teams

The fundamental nature of professional commitment underwent a radical transformation as the traditional office-centric model gave way to a decentralized landscape where digital interaction defines the standard of excellence. This transition from a physical proximity model to a distributed framework has forced organizational leaders to reconsider how they define, measure, and encourage active participation within their workforces. In the current

How Is Strategic M&A Reshaping the UK Wealth Sector?

The British wealth management industry is currently navigating a period of unprecedented structural change, where the traditional boundaries between boutique advisory and institutional fund management are rapidly dissolving. As client expectations for digital-first, holistic financial planning intersect with an increasingly complex regulatory environment, firms are discovering that organic growth alone is no longer sufficient to maintain a competitive edge. This

HR Redesigns the Modern Workplace for Remote Success

Data from current labor market reports indicates that nearly seventy percent of workers in technical and creative fields would rather resign than return to a rigid, five-day-a-week office schedule. This shift has forced human resources departments to abandon temporary survival tactics in favor of a permanent architectural overhaul of the modern corporate environment. Companies like GitLab and Cisco are no

Is Generative AI Actually Making Hiring More Difficult?

While human resources departments once viewed the emergence of advanced automated intelligence as a definitive solution for streamlining talent acquisition, the current reality suggests that these digital tools have inadvertently created an overwhelming sea of indistinguishable applications that mask true professional capability. On paper, the technology promised a frictionless experience where candidates could refine resumes effortlessly and hiring managers could

Trend Analysis: Responsible AI in Financial Services

The rapid integration of artificial intelligence into the financial sector has moved beyond experimental pilots to become a cornerstone of global corporate strategy as institutions grapple with the delicate balance of innovation and ethical oversight. This transformation marks a departure from the chaotic implementation strategies seen in previous years, signaling a move toward a more disciplined and accountable framework. As