GitHub notification emails used to send malware
Nature of the attack
- Attack uses GitHub issues/comments plus notification emails as a trusted delivery channel.
- Pattern: brand-new accounts open issues mentioning “security” or “vulnerabilities,” include a link, then the issue disappears soon after (deleted by attacker or GitHub).
- Landing page pretends to be a GitHub-related scanner and shows a “CAPTCHA” that asks users to paste a command into a shell / Windows Run dialog, often with admin privileges.
- Some note this is not GitHub “sending malware” but rather user-generated content within issues that GitHub relays via email.
How plausible is the scam?
- Many point to obvious red flags: odd domain, strange “CAPTCHA,” admin warning dialogs, mis-capitalized “Github.”
- Others stress it’s a numbers game: tired, rushed, or less-technical users (including many GitHub users) can and do fall for such tricks.
- Several commenters share anecdotes of smart/technical people getting phished or scammed; “victim-blaming” is criticized.
- Some say that if this had hit them in their first year on GitHub, they might have complied.
GitHub’s role and possible mitigations
- Calls for: better spam detection on new accounts, delaying or suppressing emails for unverified content, stripping links from notification emails, or sending generic “you have a new issue” messages only.
- Others warn stricter anti-spam will burden legitimate newcomers and that case-by-case moderation might be acceptable until abuse worsens.
- Some report fast GitHub responses to abuse reports; others report slow or inconsistent handling.
Developer habits and “curl | sh” culture
- Much debate about how normalized it is to copy-paste shell commands from websites, including official docs.
- Some argue devs are high-risk targets because they’re accustomed to installation commands and
curl | shpatterns. - Others differentiate between piping from well-known domains vs random ones, and prefer package managers with signatures.
Broader security themes
- Discussion of email links in general: many advocate “don’t click unexpected links,” but note this conflicts with common workflows (account verification, SaaS UX).
- Debate over OS design: Windows’ ease of full-privilege execution is seen as either a dangerous flaw or a “freedom” virtue; Linux/UNIX security is criticized as often undermined by
sudohabits. - Cloudflare’s role is discussed: easy hosting for phishing/malware but also more responsive than many registrars; abuse reporting is seen as clunky.