Kaspersky exposes hidden malware on GitHub stealing personal data
Kaspersky, geopolitics, and trust
- Many argue Kaspersky should be treated as a Russian state actor and thus a threat, with its public research seen partly as PR.
- Others claim the original bans were driven by geopolitics, especially after Kaspersky exposed NSA “Equation Group” tooling, and note Kaspersky’s moves of infrastructure and code-review centers to Switzerland/EU to signal neutrality.
- Some insist that regardless of past details, a Russian AV vendor is an unacceptable risk for Western governments in 2025; others counter that all major powers weaponize tech firms.
State actors, surveillance, and double standards
- Several comments generalize: all serious cybersecurity/AV companies (US, Russian, Chinese, etc.) should be assumed co-optable by their states through secret orders or legal compulsion.
- Debate over whether US companies (Google, Microsoft, etc.) should also be treated as de facto state actors, especially post‑Snowden and under surveillance laws.
- Dispute over relative threat levels: some say Russia/China run the “largest attacks in history”; others argue the US-led surveillance apparatus is the most expansive, raising human-rights concerns.
- Discussion digresses into Ukraine, NATO, and “spheres of influence,” with strongly conflicting narratives about responsibility and motives; consensus is absent.
Jurisdiction-based risk models
- Some participants choose security tools primarily by jurisdiction, not technical merit, and argue foreign software/hardware is always a potential national-security risk.
- Others emphasize applying the same standard to all states: if you distrust Russian software because of its government, you should analogously distrust US/5-Eyes vendors.
GitHub malware and open-source trust
- Multiple commenters note developers routinely
git clone && runwithout inspection, treating GitHub like a safe app store and over-trusting the “open source” label and stars. - There is discussion of:
- Attackers abusing GitHub as a dropper domain, including for game cheats and cracks that bundle credential/cookie stealers.
- How few stars/forks/issues many malicious repos have, suggesting social signals can help but don’t guarantee safety.
- Ideas for “risk scores,” endorsement systems, CVE-based reputation, mandatory static analysis, or LLM-based scanning—though feasibility and reliability are questioned.
Sandboxing, OS design, and distributions
- Several people argue mainstream OSes should enforce stronger sandboxing and permission prompts (per-app directories, explicit access grants) to limit damage from untrusted code.
- Others point out that optional sandboxes and permission systems exist (on desktop and mobile) but are underused; culture and convenience lead users and developers to bypass them.
- Some see value in curated distributions (Linux vendors, commercial package ecosystems) that vet and sign software, versus pulling arbitrary GitHub code directly.
Relationship to prior research
- One commenter links earlier independent research on large-scale GitHub malware campaigns, suggesting overlap in techniques and structures with what Kaspersky reports, though it’s unclear whether this is the same campaign or parallel ones.