Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » 390,000+ WordPress credentials stolen via malicious GitHub repository
Cybersecurity

390,000+ WordPress credentials stolen via malicious GitHub repository

InfovistarBy InfovistarDecember 15, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
390,000+ WordPress credentials stolen via malicious GitHub repository
Share
Facebook Twitter LinkedIn Pinterest Email

Cybercriminals have stolen over 390,000 WordPress credentials using a malicious GitHub repository that posed as a legitimate WordPress tool. This attack targeted offensive actors, including pen testers and researchers, exposing sensitive data like SSH private keys and AWS access keys.

The cyberattack involved a malicious actor named MUT-1244. The group targeted victims using phishing emails and trojanized GitHub repositories. These repositories falsely claimed to host proof-of-concept (PoC) exploits for security flaws.

How attackers exploited GitHub repositories for WordPress credentials

The attackers created fake GitHub repositories with phony profiles. These profiles appeared to offer tools and scripts for WordPress. One such repository, “github[.]com/hpc20235/yawpp,” claimed to be a tool for creating WordPress posts.

This tool contained two scripts. One script validated WordPress credentials, and the other used XML-RPC API to publish posts. However, the scripts also contained malicious code. This code used a rogue npm dependency named “@0xengine/xmlrpc” to deliver malware.

Malware delivery through fake tools

The malware was designed to steal system information and sensitive data. This included SSH keys, AWS credentials, and environmental variables. The malware also uploaded stolen credentials to an attacker-controlled Dropbox account.

Cybersecurity firm Checkmarx found that the npm package “@0xengine/xmlrpc” remained active for over a year. During this time, it was downloaded approximately 1,790 times.

Phishing emails as another attack vector

The attackers also used phishing emails to target academics. Victims were tricked into copying and pasting shell commands into their terminal. These commands claimed to upgrade the kernel but instead deployed malware.

This marked the first-ever ClickFix-style attack on Linux systems. The phishing emails and GitHub repositories worked together to deliver the second-stage payload.

Also read | Hackers using fake video apps to target Web3 Professionals data

Impact on victims

MUT-1244’s campaign compromised the systems of dozens of victims. Most victims were red teamers, security researchers, and those downloading PoC exploit code. Attackers gained access to SSH private keys, AWS credentials, and command history from compromised systems.

The stolen credentials were used to further compromise WordPress accounts. Researchers believe many credentials belonged to unrelated threat actors who accessed them illegally.

WordPress Credentials Stolen Through Malicious GitHub Repository

Techniques used by MUT-1244

MUT-1244 deployed the malware in multiple ways:

  1. Backdoored configuration files.
  2. Malicious payloads in PDF files.
  3. Python-based droppers.
  4. Malicious npm packages like “0xengine/meow.”

Each method was carefully designed to evade detection and steal maximum data.

How fake GitHub repositories target victims for WordPress credentials

MUT-1244 hosted fake GitHub repositories that looked convincing. They used AI-generated profile pictures and appeared professional. MUT-1244 created most repositories in late 2024, targeting researchers and pen-testers.

Cybersecurity experts previously highlighted these repositories. However, MUT-1244 continued to exploit them to distribute malware.

Also read | Malicious Chrome VPN Extensions Installed 1.5 Million Times

Broader trends in cyberattacks

In recent years, cybercriminals have exploited vulnerability disclosures to create fake PoC repositories. These repositories not only steal data but also demand payments for exploits.

Nation-state groups from countries like North Korea have targeted researchers. They aim to steal information about undisclosed security vulnerabilities. This information can help launch further attacks.

Also read | What is a digital arrest? A new deepfake tool used by cybercriminals

Steps to avoid WordPress credentials attacks:

Users should verify the source of GitHub repositories before downloading any code. They should check for legitimate activity in the repository’s history and avoid downloading tools from unknown or unverified developers.

Phishing emails should always be handled with caution. Do not execute commands or download files from unverified emails.

Conclusion

MUT-1244 launched the attack, serving as a wake-up call for the cybersecurity community. A malicious GitHub repository exposed over 390,000 WordPress credentials.

The incident highlights the growing threat posed by fake PoC repositories and phishing attacks. Security researchers and offensive actors must remain vigilant to avoid such traps.

Staying updated on cybersecurity news and adopting best practices can minimize risks. Always validate the authenticity of tools and repositories. Cybersecurity awareness is the key to staying protected in today’s digital landscape.

Cybersecurity github WordPress
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Announces Android XR OS for XR Devices
Next Article What is Willow? Google’s Quantum Computing Chip
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,658 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,370 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,658 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version