Security Alert: Active Malware Campaign Exploits GitKraken



A widespread malware campaign is actively abusing DLL side-loading techniques through a signed GitKraken ahost.exe binary. Attackers place a malicious libcares-2.dll file in the same directory to hijack the DLL search order and bypass signature verification mechanisms, allowing arbitrary code execution.

The campaign uses invoice and RFQ-themed phishing lures to distribute info-stealing malware and Remote Access Trojans (RATs). This poses a significant risk to developers and enterprises relying on Git-based tools for version control and collaboration.

Web3 developers using GitKraken should exercise caution with suspicious file attachments and verify the integrity of executable files from trusted sources only. Keep your development tools updated and monitor system behavior for unauthorized DLL loading activities.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
StableGeniusvip
· 9h ago
dll side-loading through signed binaries? lol this is exactly why i warned everyone about trusting vendor signatures back in '22. predictable stuff tbh
Reply0
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)