Fake Linux Foundation leader using Slack to phish devs
Briefly

Fake Linux Foundation leader using Slack to phish devs
"Installing the certificate enables interception of encrypted traffic and credential theft. Executing the binary may result in full system compromise."
"The social engineering campaign specifically targets TODO and CNCF, two projects hosted by the Linux Foundation, aiming to trick developers into providing sensitive information."
A malware campaign has been identified that targets open source software developers through Slack by impersonating a Linux Foundation official. The attacker aims to deceive developers into clicking a phishing link that mimics a legitimate Google Workspace sign-in process. This link leads to a fraudulent authentication page, where users are prompted to enter their credentials and install a malicious root certificate. The malware can compromise systems on both macOS and Windows, enabling credential theft and full system compromise.
Read at Theregister
Unable to calculate read time
[
|
]