Pointed out that GitHub's cloud development environment 'Codespace' can be exploited as a malware distribution server

Security company

Trend Micro points out that malware can be hosted and distributed using `` Codespaces '', a free cloud development environment that can be accessed from a browser provided by GitHub.

Abusing a GitHub Codespaces Feature For Malware Delivery

How attackers might use GitHub Codespaces to hide malware delivery | CSO Online

Hackers can use GitHub Codespaces to host and deliver malware

Codespaces is a tool that allows you to create and test applications in development containers running on the GitHub server. Since its general availability in November 2022, Codespaces has gained popularity among developers who prefer a preconfigured container-based environment with the tools and dependencies they need for development.

Codespaces allows external users to test and showcase code under development. To do that, you need to do port forwarding in Codespaces and generate a URL to access the code you are developing. This port forwarding setting can be configured as private or public. When set to private, authentication in the form of a token or cookie is required to access the URL, while when set to public, authentication is required. , the code is accessible to anyone who knows the URL.

The port forwarding settings in Codespaces are as follows and can be set to 'Private' and 'Public'.

By using this feature, developers can flexibly demonstrate code, but Trend Micro can abuse this to turn Codespaces into a server for hosting malware. I point out that it is possible.

Users can use the

GitHub CLI to run commands inside the development container. So Trend Micro created a configuration that opens a simple HTTP server with a Python runtime in a development container and forwards port 8000 to the public. Additionally, I'm using the GitHub CLI to authenticate to the development container, download the malware-containing archive from an external URL, and run two simple commands to extract it locally in a directory served by a Python-based server. This completes the creation of an open directory containing malware that can be accessed via a URL generated by Codespaces.

Below is an image showing how to host malware using Codespaces.

If this method is used, the victim of the attack will download malware from a domain owned by GitHub, a reliable service, so the possibility of malware being detected by the

security gateway will be low. As such, Trend Micro warns that this technique could be used, for example, to host malicious executables downloaded using phishing attacks or other malware.

Trend Micro points out that exploiting cloud service providers to host malware is not new. However, compared to other cloud service providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform, the cost barrier to exploiting GitHub's Codespaces is 'low'.

Technology media BleepingComputer reports, 'I touched Codespaces for the first time, but I was able to create a'malicious web server'in less than 10 minutes.'

GitHub policy automatically deletes inactive Codespaces after 30 days, allowing attackers to use the same URL for a month. At the time of writing the article, no cases of Codespaces abuse have been confirmed, but Trend Micro emphasizes the possibility of malicious attacks using this technique.

in Web Service,   Security, Posted by logu_ii