Open-Source Devs Targeted in Sophisticated Phishing Attack Using Slack and Google Sites

Phishing Campaign Impersonates Linux Foundation on Slack to Steal Developer Credentials and Install Malicious Certificates

HIGH
April 14, 2026
7m read
PhishingSupply Chain AttackThreat Actor

Related Entities

Products & Tech

Google SitesSlack

Full Report

Executive Summary

A highly targeted and sophisticated social engineering campaign is actively targeting developers in the open-source community. Attackers are using a combination of Slack impersonation and malicious pages hosted on Google Sites to steal credentials and trick developers into installing malicious root certificates. The attackers pose as a known representative from the Linux Foundation to build trust with members of communities like the Cloud Native Computing Foundation (CNCF). This attack is particularly dangerous because successfully compromising a developer can provide a foothold for a much broader software supply chain attack. The Open Source Security Foundation (OpenSSF) has issued warnings, advising developers to be extremely vigilant.

Threat Overview

The attack flow is a multi-stage social engineering effort designed to exploit trust within the open-source community.

Attack Chain:

  1. Impersonation & Contact: The attacker, posing as a Linux Foundation official, initiates a direct message conversation with a target developer on Slack.
  2. Lure: The attacker provides a link, likely under the guise of collaboration or project verification, which directs the victim to a page created with Google Sites.
  3. Credential Theft: The Google Sites page is a convincing replica of a Google Workspace login portal. The developer is prompted to enter their credentials, which are harvested by the attacker.
  4. Certificate Installation: After stealing the credentials, the attack proceeds to a second stage. The user is prompted to install a "security certificate" to gain access. This is the most critical part of the attack.
  5. Man-in-the-Middle: The installed "certificate" is a malicious root CA. With this installed on the developer's machine, the attacker can perform Man-in-the-Middle (MitM) attacks, intercepting and decrypting all of the victim's network traffic, including access to private code repositories, internal services, and other sensitive information.

The attack's payload varies by OS, with macOS versions downloading and executing additional malicious binaries.

Technical Analysis

This campaign masterfully combines several TTPs to bypass both technical and human defenses.

Impact Assessment

  • Software Supply Chain Compromise: The primary risk is a full-scale supply chain attack. A compromised developer could unknowingly commit malicious code to a widely used open-source project, affecting thousands or millions of downstream users.
  • Intellectual Property Theft: Attackers can steal proprietary code, API keys, and other sensitive data from the developer's machine and the organizations they work for.
  • Wider Network Compromise: The compromised developer's machine can be used as a beachhead to pivot into their employer's corporate network.
  • Erosion of Trust: Attacks like this can damage the collaborative and trust-based nature of the open-source community, making developers more hesitant to engage with new contacts.

Cyber Observables for Detection

Detection focuses on identifying the installation of untrusted certificates and suspicious process chains.

Type Value Description
log_source Certificate Store Logs Monitor for the installation of new root Certificate Authorities on endpoints. This is a rare and highly privileged event.
process_name security (macOS) On macOS, look for the security add-trusted-cert command being executed, especially by scripts or from a browser process.
log_source Browser History Look for redirects to suspicious Google Sites URLs, especially if they are followed by a certificate download prompt.
command_line_pattern `curl ... bash`

Detection & Response

  • D3FEND: Certificate Analysis: Use endpoint security tools to continuously monitor the system's trusted root certificate store. Any addition should trigger a high-severity alert for immediate investigation. This is a direct application of D3-CA: Certificate Analysis.
  • D3FEND: Process Analysis: On endpoints, monitor for suspicious process parent-child relationships. A browser process should not be spawning a shell script that then calls security or certutil commands to install a certificate. This is a key part of D3-PA: Process Analysis.
  • Network Level: While the malicious certificate allows decryption, outbound connections to the attacker's C2 server can still be detected. Use network traffic analysis to look for connections to newly registered domains or known malicious IP addresses.

Mitigation

  • User Training: This is paramount. Developers must be educated about the specific risks of social engineering within their community. They should be taught to be skeptical of unsolicited DMs, even from apparently trusted individuals, and to verify requests through out-of-band channels. This aligns with M1017 - User Training.
  • Endpoint Hardening: Use Mobile Device Management (MDM) or other endpoint management tools to restrict the ability of standard users to install new root certificates. This action should be reserved for administrators and heavily audited.
  • Phishing-Resistant MFA: Encourage or enforce the use of phishing-resistant MFA (like FIDO2/WebAuthn) for critical services like code repositories (GitHub, GitLab) and corporate logins. This would have prevented the initial credential theft.
  • D3FEND: Executable Denylisting: While not directly applicable to the certificate itself, for the macOS variant, application control policies could prevent the execution of the unsigned binary downloaded by the script. This relates to D3-EDL: Executable Denylisting.

Timeline of Events

1
April 14, 2026
This article was published

MITRE ATT&CK Mitigations

Educate developers on the specific social engineering tactics used against them, including impersonation on community platforms like Slack.

Implement phishing-resistant MFA (FIDO2) to protect accounts even if credentials are stolen.

Use endpoint management to restrict users' ability to install new root certificates, a high-privilege action.

Use web filtering to block access to known malicious domains and potentially categorize and warn on access to uncategorized hosting sites.

D3FEND Defensive Countermeasures

The core of this attack is the installation of a malicious root certificate. Therefore, continuous monitoring of the trusted certificate stores on developer endpoints is the most direct and effective detective control. EDR (Endpoint Detection and Response) solutions or specialized configuration management tools should be configured to generate a high-priority, non-ignorable alert whenever a new root or intermediate certificate is added to any machine's trust store. This is not a normal user activity and should be treated as a potential compromise until proven otherwise. The alert should trigger an automated incident response workflow, which could include isolating the affected machine from the network and collecting forensic data. Security teams should maintain a 'golden image' or allowlist of approved root CAs for their environment, and any deviation should be investigated immediately. This proactive analysis turns a stealthy persistence mechanism into a loud alarm.

To detect the attack before the certificate is even installed, security teams should leverage Process Analysis on developer workstations. A key anomalous behavior in this attack is the process chain. A web browser (e.g., chrome.exe, firefox.exe) should not be the parent process for a command-line utility that modifies system security settings, such as certutil.exe on Windows or security on macOS. EDR tools should be configured with detection rules that specifically look for these suspicious parent-child process relationships. For example: ParentProcess: chrome.exe -> ChildProcess: cmd.exe -> GrandchildProcess: certutil.exe -addstore root.... This type of behavioral detection is highly effective at catching the execution phase of the attack, regardless of the specific malware or script being used. It focuses on the attacker's actions on the objective, providing a robust defense against this class of social engineering attacks.

Sources & References

Fake Linux Foundation leader using Slack to phish devs
The Register (theregister.com) April 13, 2026
Social engineering attacks on open source developers are escalating
Help Net Security (helpnetsecurity.com) April 8, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PhishingSocial EngineeringOpen SourceLinux FoundationSlackGoogle SitesMan-in-the-MiddleRoot Certificate

📢 Share This Article

Help others stay informed about cybersecurity threats