A highly targeted and sophisticated social engineering campaign is actively targeting developers in the open-source community. Attackers are using a combination of Slack impersonation and malicious pages hosted on Google Sites to steal credentials and trick developers into installing malicious root certificates. The attackers pose as a known representative from the Linux Foundation to build trust with members of communities like the Cloud Native Computing Foundation (CNCF). This attack is particularly dangerous because successfully compromising a developer can provide a foothold for a much broader software supply chain attack. The Open Source Security Foundation (OpenSSF) has issued warnings, advising developers to be extremely vigilant.
The attack flow is a multi-stage social engineering effort designed to exploit trust within the open-source community.
Attack Chain:
The attack's payload varies by OS, with macOS versions downloading and executing additional malicious binaries.
This campaign masterfully combines several TTPs to bypass both technical and human defenses.
T1649 - Social Engineering - The entire operation is built on impersonation and manipulation.T1566.002 - Spearphishing Link - A targeted link is delivered via a trusted communication platform (Slack).T1557.002 - Rogue CA Certificate - The ultimate goal is to install a malicious root certificate to intercept encrypted traffic. This is a highly effective and dangerous technique.T1555.003 - Credentials from Web Browsers - The fake login page is designed to steal credentials stored in or entered into the browser.T1059 - Command and Scripting Interpreter - The macOS variant uses scripting to download and execute further payloads.Detection focuses on identifying the installation of untrusted certificates and suspicious process chains.
| Type | Value | Description |
|---|---|---|
| log_source | Certificate Store Logs | Monitor for the installation of new root Certificate Authorities on endpoints. This is a rare and highly privileged event. |
| process_name | security (macOS) |
On macOS, look for the security add-trusted-cert command being executed, especially by scripts or from a browser process. |
| log_source | Browser History | Look for redirects to suspicious Google Sites URLs, especially if they are followed by a certificate download prompt. |
| command_line_pattern | `curl ... | bash` |
D3-CA: Certificate Analysis.security or certutil commands to install a certificate. This is a key part of D3-PA: Process Analysis.M1017 - User Training.D3-EDL: Executable Denylisting.Educate developers on the specific social engineering tactics used against them, including impersonation on community platforms like Slack.
Implement phishing-resistant MFA (FIDO2) to protect accounts even if credentials are stolen.
Use endpoint management to restrict users' ability to install new root certificates, a high-privilege action.
Use web filtering to block access to known malicious domains and potentially categorize and warn on access to uncategorized hosting sites.
The core of this attack is the installation of a malicious root certificate. Therefore, continuous monitoring of the trusted certificate stores on developer endpoints is the most direct and effective detective control. EDR (Endpoint Detection and Response) solutions or specialized configuration management tools should be configured to generate a high-priority, non-ignorable alert whenever a new root or intermediate certificate is added to any machine's trust store. This is not a normal user activity and should be treated as a potential compromise until proven otherwise. The alert should trigger an automated incident response workflow, which could include isolating the affected machine from the network and collecting forensic data. Security teams should maintain a 'golden image' or allowlist of approved root CAs for their environment, and any deviation should be investigated immediately. This proactive analysis turns a stealthy persistence mechanism into a loud alarm.
To detect the attack before the certificate is even installed, security teams should leverage Process Analysis on developer workstations. A key anomalous behavior in this attack is the process chain. A web browser (e.g., chrome.exe, firefox.exe) should not be the parent process for a command-line utility that modifies system security settings, such as certutil.exe on Windows or security on macOS. EDR tools should be configured with detection rules that specifically look for these suspicious parent-child process relationships. For example: ParentProcess: chrome.exe -> ChildProcess: cmd.exe -> GrandchildProcess: certutil.exe -addstore root.... This type of behavioral detection is highly effective at catching the execution phase of the attack, regardless of the specific malware or script being used. It focuses on the attacker's actions on the objective, providing a robust defense against this class of social engineering attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats